/external/boringssl/src/crypto/fipsmodule/rsa/ |
D | rsa_impl.c | 77 int rsa_check_public_key(const RSA *rsa) { in rsa_check_public_key() argument 78 if (rsa->n == NULL || rsa->e == NULL) { in rsa_check_public_key() 83 unsigned n_bits = BN_num_bits(rsa->n); in rsa_check_public_key() 99 unsigned e_bits = BN_num_bits(rsa->e); in rsa_check_public_key() 104 !BN_is_odd(rsa->e)) { in rsa_check_public_key() 117 assert(BN_ucmp(rsa->n, rsa->e) > 0); in rsa_check_public_key() 142 static int freeze_private_key(RSA *rsa, BN_CTX *ctx) { in freeze_private_key() argument 143 CRYPTO_MUTEX_lock_read(&rsa->lock); in freeze_private_key() 144 int frozen = rsa->private_key_frozen; in freeze_private_key() 145 CRYPTO_MUTEX_unlock_read(&rsa->lock); in freeze_private_key() [all …]
|
D | rsa.c | 88 RSA *rsa = OPENSSL_malloc(sizeof(RSA)); in RSA_new_method() local 89 if (rsa == NULL) { in RSA_new_method() 94 OPENSSL_memset(rsa, 0, sizeof(RSA)); in RSA_new_method() 97 rsa->meth = ENGINE_get_RSA_method(engine); in RSA_new_method() 100 if (rsa->meth == NULL) { in RSA_new_method() 101 rsa->meth = (RSA_METHOD *) RSA_default_method(); in RSA_new_method() 103 METHOD_ref(rsa->meth); in RSA_new_method() 105 rsa->references = 1; in RSA_new_method() 106 rsa->flags = rsa->meth->flags; in RSA_new_method() 107 CRYPTO_MUTEX_init(&rsa->lock); in RSA_new_method() [all …]
|
/external/rust/crates/quiche/deps/boringssl/src/crypto/fipsmodule/rsa/ |
D | rsa_impl.c | 76 int rsa_check_public_key(const RSA *rsa) { in rsa_check_public_key() argument 77 if (rsa->n == NULL || rsa->e == NULL) { in rsa_check_public_key() 82 unsigned rsa_bits = BN_num_bits(rsa->n); in rsa_check_public_key() 100 if (BN_num_bits(rsa->e) > kMaxExponentBits) { in rsa_check_public_key() 113 assert(BN_ucmp(rsa->n, rsa->e) > 0); in rsa_check_public_key() 138 static int freeze_private_key(RSA *rsa, BN_CTX *ctx) { in freeze_private_key() argument 139 CRYPTO_MUTEX_lock_read(&rsa->lock); in freeze_private_key() 140 int frozen = rsa->private_key_frozen; in freeze_private_key() 141 CRYPTO_MUTEX_unlock_read(&rsa->lock); in freeze_private_key() 147 CRYPTO_MUTEX_lock_write(&rsa->lock); in freeze_private_key() [all …]
|
D | rsa.c | 88 RSA *rsa = OPENSSL_malloc(sizeof(RSA)); in RSA_new_method() local 89 if (rsa == NULL) { in RSA_new_method() 94 OPENSSL_memset(rsa, 0, sizeof(RSA)); in RSA_new_method() 97 rsa->meth = ENGINE_get_RSA_method(engine); in RSA_new_method() 100 if (rsa->meth == NULL) { in RSA_new_method() 101 rsa->meth = (RSA_METHOD *) RSA_default_method(); in RSA_new_method() 103 METHOD_ref(rsa->meth); in RSA_new_method() 105 rsa->references = 1; in RSA_new_method() 106 rsa->flags = rsa->meth->flags; in RSA_new_method() 107 CRYPTO_MUTEX_init(&rsa->lock); in RSA_new_method() [all …]
|
/external/rust/crates/quiche/deps/boringssl/src/crypto/rsa_extra/ |
D | rsa_test.cc | 468 bssl::UniquePtr<RSA> rsa( in TEST() local 470 ASSERT_TRUE(rsa); in TEST() 472 EXPECT_TRUE(RSA_check_key(rsa.get())); in TEST() 477 rsa.get(), &out_len, out, sizeof(out), kTwoPrimeEncryptedMessage, in TEST() 483 bssl::UniquePtr<RSA> rsa( in TEST() local 485 ASSERT_TRUE(rsa); in TEST() 486 EXPECT_TRUE(RSA_check_fips(rsa.get())); in TEST() 496 bssl::UniquePtr<RSA> rsa(RSA_new()); in TEST() local 497 ASSERT_TRUE(rsa); in TEST() 501 EXPECT_FALSE(RSA_generate_key_fips(rsa.get(), 512, nullptr)); in TEST() [all …]
|
D | rsa_asn1.c | 127 int RSA_marshal_public_key(CBB *cbb, const RSA *rsa) { in RSA_marshal_public_key() argument 130 !marshal_integer(&child, rsa->n) || in RSA_marshal_public_key() 131 !marshal_integer(&child, rsa->e) || in RSA_marshal_public_key() 140 const RSA *rsa) { in RSA_public_key_to_bytes() argument 144 !RSA_marshal_public_key(&cbb, rsa) || in RSA_public_key_to_bytes() 216 int RSA_marshal_private_key(CBB *cbb, const RSA *rsa) { in RSA_marshal_private_key() argument 220 !marshal_integer(&child, rsa->n) || in RSA_marshal_private_key() 221 !marshal_integer(&child, rsa->e) || in RSA_marshal_private_key() 222 !marshal_integer(&child, rsa->d) || in RSA_marshal_private_key() 223 !marshal_integer(&child, rsa->p) || in RSA_marshal_private_key() [all …]
|
/external/boringssl/src/crypto/rsa_extra/ |
D | rsa_test.cc | 468 bssl::UniquePtr<RSA> rsa( in TEST() local 470 ASSERT_TRUE(rsa); in TEST() 472 EXPECT_TRUE(RSA_check_key(rsa.get())); in TEST() 477 rsa.get(), &out_len, out, sizeof(out), kTwoPrimeEncryptedMessage, in TEST() 483 bssl::UniquePtr<RSA> rsa( in TEST() local 485 ASSERT_TRUE(rsa); in TEST() 486 EXPECT_TRUE(RSA_check_fips(rsa.get())); in TEST() 496 bssl::UniquePtr<RSA> rsa(RSA_new()); in TEST() local 497 ASSERT_TRUE(rsa); in TEST() 501 EXPECT_FALSE(RSA_generate_key_fips(rsa.get(), 512, nullptr)); in TEST() [all …]
|
D | rsa_asn1.c | 126 int RSA_marshal_public_key(CBB *cbb, const RSA *rsa) { in RSA_marshal_public_key() argument 129 !marshal_integer(&child, rsa->n) || in RSA_marshal_public_key() 130 !marshal_integer(&child, rsa->e) || in RSA_marshal_public_key() 139 const RSA *rsa) { in RSA_public_key_to_bytes() argument 143 !RSA_marshal_public_key(&cbb, rsa) || in RSA_public_key_to_bytes() 215 int RSA_marshal_private_key(CBB *cbb, const RSA *rsa) { in RSA_marshal_private_key() argument 219 !marshal_integer(&child, rsa->n) || in RSA_marshal_private_key() 220 !marshal_integer(&child, rsa->e) || in RSA_marshal_private_key() 221 !marshal_integer(&child, rsa->d) || in RSA_marshal_private_key() 222 !marshal_integer(&child, rsa->p) || in RSA_marshal_private_key() [all …]
|
/external/python/rsa/tests/ |
D | test_prime.py | 19 import rsa.prime 20 import rsa.randnum 28 self.assertFalse(rsa.prime.is_prime(-1)) 29 self.assertFalse(rsa.prime.is_prime(0)) 30 self.assertFalse(rsa.prime.is_prime(1)) 31 self.assertTrue(rsa.prime.is_prime(2)) 32 self.assertFalse(rsa.prime.is_prime(42)) 33 self.assertTrue(rsa.prime.is_prime(41)) 38 [x for x in range(901, 1000) if rsa.prime.is_prime(x)] 42 self.assertTrue(rsa.prime.is_prime(982451653)) [all …]
|
D | test_cli.py | 15 import rsa 16 import rsa.cli 17 import rsa.util 85 cls.pub_key, cls.priv_key = rsa.newkeys(512) 117 self.assertExits(1, rsa.cli.keygen) 122 rsa.cli.keygen() 135 rsa.cli.keygen() 145 rsa.PrivateKey.load_pkcs1(pemfile.read()) 151 rsa.cli.keygen() 161 rsa.PrivateKey.load_pkcs1(derfile.read(), format='DER') [all …]
|
D | test_pkcs1.py | 21 import rsa 22 from rsa import pkcs1 23 from rsa._compat import byte 28 (self.pub, self.priv) = rsa.newkeys(256) 71 self.private_key = rsa.PrivateKey.load_pkcs1( 80 message = rsa.decrypt(self.cyphertext, self.private_key) 85 with self.assertRaises(rsa.DecryptionError): 86 rsa.decrypt(cyphertext, self.private_key) 90 with self.assertRaises(rsa.DecryptionError): 91 rsa.decrypt(cyphertext, self.private_key) [all …]
|
D | test_load_save_keys.py | 24 import rsa.key 79 key = rsa.key.PrivateKey.load_pkcs1(PRIVATE_DER, 'DER') 80 expected = rsa.key.PrivateKey(3727264081, 65537, 3349121513, 65063, 57287) 103 key = rsa.key.PrivateKey.load_pkcs1(PRIVATE_DER, 'DER') 120 key = rsa.key.PrivateKey(3727264081, 65537, 3349121513, 65063, 57287) 129 key = rsa.key.PublicKey.load_pkcs1(PUBLIC_DER, 'DER') 130 expected = rsa.key.PublicKey(3727264081, 65537) 137 key = rsa.key.PublicKey(3727264081, 65537) 150 key = rsa.key.PrivateKey.load_pkcs1(PRIVATE_PEM, 'PEM') 151 expected = rsa.key.PrivateKey(3727264081, 65537, 3349121513, 65063, 57287) [all …]
|
D | test_key.py | 7 import rsa.key 8 import rsa.core 19 pk = rsa.key.PrivateKey(3727264081, 65537, 3349121513, 65063, 57287) 22 encrypted = rsa.core.encrypt_int(message, pk.e, pk.n) 25 decrypted = rsa.core.decrypt_int(blinded_1, pk.d, pk.n) 35 decrypted = rsa.core.decrypt_int(blinded_2, pk.d, pk.n) 42 priv, pub = rsa.key.newkeys(16, exponent=3) 48 priv, pub = rsa.key.newkeys(16) 54 pk = rsa.key.PrivateKey(3727264081, 65537, 3349121513, 65063, 57287) 72 (p, q, e, d) = rsa.key.gen_keys(64, [all …]
|
D | test_parallel.py | 5 import rsa.prime 6 import rsa.parallel 7 import rsa.common 14 p = rsa.parallel.getprime(1024, 3) 16 self.assertFalse(rsa.prime.is_prime(p - 1)) 17 self.assertTrue(rsa.prime.is_prime(p)) 18 self.assertFalse(rsa.prime.is_prime(p + 1)) 20 self.assertEqual(1024, rsa.common.bit_size(p))
|
/external/rust/crates/quiche/deps/boringssl/src/include/openssl/ |
D | rsa.h | 90 OPENSSL_EXPORT void RSA_free(RSA *rsa); 94 OPENSSL_EXPORT int RSA_up_ref(RSA *rsa); 100 OPENSSL_EXPORT unsigned RSA_bits(const RSA *rsa); 103 OPENSSL_EXPORT const BIGNUM *RSA_get0_n(const RSA *rsa); 106 OPENSSL_EXPORT const BIGNUM *RSA_get0_e(const RSA *rsa); 110 OPENSSL_EXPORT const BIGNUM *RSA_get0_d(const RSA *rsa); 114 OPENSSL_EXPORT const BIGNUM *RSA_get0_p(const RSA *rsa); 118 OPENSSL_EXPORT const BIGNUM *RSA_get0_q(const RSA *rsa); 122 OPENSSL_EXPORT const BIGNUM *RSA_get0_dmp1(const RSA *rsa); 126 OPENSSL_EXPORT const BIGNUM *RSA_get0_dmq1(const RSA *rsa); [all …]
|
/external/boringssl/src/include/openssl/ |
D | rsa.h | 90 OPENSSL_EXPORT void RSA_free(RSA *rsa); 94 OPENSSL_EXPORT int RSA_up_ref(RSA *rsa); 100 OPENSSL_EXPORT unsigned RSA_bits(const RSA *rsa); 103 OPENSSL_EXPORT const BIGNUM *RSA_get0_n(const RSA *rsa); 106 OPENSSL_EXPORT const BIGNUM *RSA_get0_e(const RSA *rsa); 110 OPENSSL_EXPORT const BIGNUM *RSA_get0_d(const RSA *rsa); 114 OPENSSL_EXPORT const BIGNUM *RSA_get0_p(const RSA *rsa); 118 OPENSSL_EXPORT const BIGNUM *RSA_get0_q(const RSA *rsa); 122 OPENSSL_EXPORT const BIGNUM *RSA_get0_dmp1(const RSA *rsa); 126 OPENSSL_EXPORT const BIGNUM *RSA_get0_dmq1(const RSA *rsa); [all …]
|
/external/vboot_reference/tests/ |
D | vboot_common2_tests.c | 21 RSAPublicKey *rsa; in VerifyPublicKeyToRSA() local 34 rsa = PublicKeyToRSA(orig_key); in VerifyPublicKeyToRSA() 35 TEST_NEQ((size_t)rsa, 0, "PublicKeyToRSA() ok"); in VerifyPublicKeyToRSA() 36 if (rsa) { in VerifyPublicKeyToRSA() 37 TEST_EQ((int)rsa->algorithm, (int)key->algorithm, in VerifyPublicKeyToRSA() 39 RSAPublicKeyFree(rsa); in VerifyPublicKeyToRSA() 49 RSAPublicKey *rsa; in VerifyDataTest() local 54 rsa = PublicKeyToRSA(public_key); in VerifyDataTest() 55 TEST_PTR_NEQ(rsa, 0, "VerifyData() calculate rsa"); in VerifyDataTest() 57 if (!sig || !rsa) in VerifyDataTest() [all …]
|
/external/libwebsockets/lib/tls/openssl/ |
D | lws-genrsa.c | 45 rsa_pkey_wrap(struct lws_genrsa_ctx *ctx, RSA *rsa) in rsa_pkey_wrap() argument 57 if (EVP_PKEY_assign_RSA(pkey, rsa) != 1) { in rsa_pkey_wrap() 109 ctx->rsa = RSA_new(); in lws_genrsa_create() 110 if (!ctx->rsa) { in lws_genrsa_create() 116 if (RSA_set0_key(ctx->rsa, ctx->bn[LWS_GENCRYPTO_RSA_KEYEL_N], in lws_genrsa_create() 122 RSA_set0_factors(ctx->rsa, ctx->bn[LWS_GENCRYPTO_RSA_KEYEL_P], in lws_genrsa_create() 125 ctx->rsa->e = ctx->bn[LWS_GENCRYPTO_RSA_KEYEL_E]; in lws_genrsa_create() 126 ctx->rsa->n = ctx->bn[LWS_GENCRYPTO_RSA_KEYEL_N]; in lws_genrsa_create() 127 ctx->rsa->d = ctx->bn[LWS_GENCRYPTO_RSA_KEYEL_D]; in lws_genrsa_create() 128 ctx->rsa->p = ctx->bn[LWS_GENCRYPTO_RSA_KEYEL_P]; in lws_genrsa_create() [all …]
|
/external/boringssl/src/crypto/evp/ |
D | p_rsa_asn1.c | 79 !RSA_marshal_public_key(&key_bitstring, key->pkey.rsa) || in rsa_pub_encode() 100 RSA *rsa = RSA_parse_public_key(key); in rsa_pub_decode() local 101 if (rsa == NULL || CBS_len(key) != 0) { in rsa_pub_decode() 103 RSA_free(rsa); in rsa_pub_decode() 107 EVP_PKEY_assign_RSA(out, rsa); in rsa_pub_decode() 112 return BN_cmp(b->pkey.rsa->n, a->pkey.rsa->n) == 0 && in rsa_pub_cmp() 113 BN_cmp(b->pkey.rsa->e, a->pkey.rsa->e) == 0; in rsa_pub_cmp() 125 !RSA_marshal_private_key(&private_key, key->pkey.rsa) || in rsa_priv_encode() 144 RSA *rsa = RSA_parse_private_key(key); in rsa_priv_decode() local 145 if (rsa == NULL || CBS_len(key) != 0) { in rsa_priv_decode() [all …]
|
/external/rust/crates/quiche/deps/boringssl/src/crypto/evp/ |
D | p_rsa_asn1.c | 79 !RSA_marshal_public_key(&key_bitstring, key->pkey.rsa) || in rsa_pub_encode() 100 RSA *rsa = RSA_parse_public_key(key); in rsa_pub_decode() local 101 if (rsa == NULL || CBS_len(key) != 0) { in rsa_pub_decode() 103 RSA_free(rsa); in rsa_pub_decode() 107 EVP_PKEY_assign_RSA(out, rsa); in rsa_pub_decode() 112 return BN_cmp(b->pkey.rsa->n, a->pkey.rsa->n) == 0 && in rsa_pub_cmp() 113 BN_cmp(b->pkey.rsa->e, a->pkey.rsa->e) == 0; in rsa_pub_cmp() 125 !RSA_marshal_private_key(&private_key, key->pkey.rsa) || in rsa_priv_encode() 144 RSA *rsa = RSA_parse_private_key(key); in rsa_priv_decode() local 145 if (rsa == NULL || CBS_len(key) != 0) { in rsa_priv_decode() [all …]
|
/external/python/rsa/rsa/ |
D | cli.py | 25 import rsa 26 import rsa.key 27 import rsa.pkcs1 29 HASH_METHODS = sorted(rsa.pkcs1.HASH_METHODS.keys()) 67 (pub_key, priv_key) = rsa.newkeys(keysize) 104 key_class = rsa.PublicKey # type: typing.Type[rsa.key.AbstractKey] 112 def perform_operation(self, indata: bytes, key: rsa.key.AbstractKey, 161 def read_key(self, filename: str, keyform: str) -> rsa.key.AbstractKey: 203 def perform_operation(self, indata: bytes, pub_key: rsa.key.AbstractKey, 206 assert isinstance(pub_key, rsa.key.PublicKey) [all …]
|
/external/tpm2-tss/test/helper/ |
D | tpm_getek.c | 64 .unique.rsa = { in main() 114 RSA *rsa = RSA_new(); in main() local 122 BIGNUM *n = BN_bin2bn(out_public.publicArea.unique.rsa.buffer, in main() 123 out_public.publicArea.unique.rsa.size, NULL); in main() 138 rsa->e = e; in main() 139 rsa->n = n; in main() 140 rsa->d = d; in main() 141 rsa->p = p; in main() 142 rsa->q = q; in main() 143 rsa->dmp1 = dmp1; in main() [all …]
|
/external/python/rsa/doc/ |
D | usage.rst | 30 You can use the :py:func:`rsa.newkeys` function to create a keypair: 32 >>> import rsa 33 >>> (pubkey, privkey) = rsa.newkeys(512) 35 Alternatively you can use :py:meth:`rsa.PrivateKey.load_pkcs1` and 36 :py:meth:`rsa.PublicKey.load_pkcs1` to load keys from a file: 38 >>> import rsa 41 >>> privkey = rsa.PrivateKey.load_pkcs1(keydata) 61 >>> (pubkey, privkey) = rsa.newkeys(512, poolsize=8) 97 To encrypt or decrypt a message, use :py:func:`rsa.encrypt` resp. 98 :py:func:`rsa.decrypt`. Let's say that Alice wants to send a message [all …]
|
D | reference.rst | 10 .. autofunction:: rsa.encrypt 12 .. autofunction:: rsa.decrypt 14 .. autofunction:: rsa.sign 16 .. autofunction:: rsa.verify 18 .. autofunction:: rsa.find_signature_hash 20 .. autofunction:: rsa.newkeys(keysize) 34 .. autoclass:: rsa.PublicKey 38 .. autoclass:: rsa.PrivateKey 45 .. autoclass:: rsa.pkcs1.CryptoError(Exception) 47 .. autoclass:: rsa.pkcs1.DecryptionError(CryptoError) [all …]
|
/external/python/rsa/ |
D | README.md | 4 [](https://pypi.org/project/rsa/) 5 …https://travis-ci.org/sybrenstuvel/python-rsa.svg?branch=master)](https://travis-ci.org/sybrenstuv… 6 …io/repos/github/sybrenstuvel/python-rsa/badge.svg?branch=master)](https://coveralls.io/github/sybr… 9 [Python-RSA](https://stuvel.eu/rsa) is a pure-Python RSA implementation. It supports 15 …-RSA homepage](https://stuvel.eu/rsa). For all changes, check [the changelog](https://github.com/s… 19 pip install rsa 21 or download it from the [Python Package Index](https://pypi.org/project/rsa/). 23 The source code is maintained at [GitHub](https://github.com/sybrenstuvel/python-rsa/) and is 44 - `rsa._version133` 45 - `rsa._version200` [all …]
|