Home
last modified time | relevance | path

Searched refs:RSA (Results 1 – 25 of 153) sorted by relevance

1234567

/external/boringssl/src/crypto/err/
Drsa.errordata1 RSA,143,BAD_ENCODING
2 RSA,100,BAD_E_VALUE
3 RSA,101,BAD_FIXED_HEADER_DECRYPT
4 RSA,102,BAD_PAD_BYTE_COUNT
5 RSA,103,BAD_RSA_PARAMETERS
6 RSA,104,BAD_SIGNATURE
7 RSA,145,BAD_VERSION
8 RSA,105,BLOCK_TYPE_IS_NOT_01
9 RSA,106,BN_NOT_INITIALIZED
10 RSA,142,CANNOT_RECOVER_MULTI_PRIME_KEY
[all …]
/external/boringssl/src/include/openssl/
Drsa.h78 OPENSSL_EXPORT RSA *RSA_new(void);
81 OPENSSL_EXPORT RSA *RSA_new_method(const ENGINE *engine);
85 OPENSSL_EXPORT void RSA_free(RSA *rsa);
88 OPENSSL_EXPORT int RSA_up_ref(RSA *rsa);
101 OPENSSL_EXPORT int RSA_generate_key_ex(RSA *rsa, int bits, BIGNUM *e,
106 OPENSSL_EXPORT int RSA_generate_multi_prime_key(RSA *rsa, int bits,
129 OPENSSL_EXPORT int RSA_encrypt(RSA *rsa, size_t *out_len, uint8_t *out,
148 OPENSSL_EXPORT int RSA_decrypt(RSA *rsa, size_t *out_len, uint8_t *out,
162 uint8_t *to, RSA *rsa, int padding);
175 uint8_t *to, RSA *rsa, int padding);
[all …]
/external/boringssl/src/crypto/rsa/
Drsa_asn1.c91 OPENSSL_PUT_ERROR(RSA, RSA_R_VALUE_MISSING); in marshal_integer()
97 static RSA *parse_public_key(CBS *cbs, int buggy) { in parse_public_key()
98 RSA *ret = RSA_new(); in parse_public_key()
107 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_ENCODING); in parse_public_key()
114 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_RSA_PARAMETERS); in parse_public_key()
122 RSA *RSA_parse_public_key(CBS *cbs) { in RSA_parse_public_key()
126 RSA *RSA_parse_public_key_buggy(CBS *cbs) { in RSA_parse_public_key_buggy()
134 RSA *RSA_public_key_from_bytes(const uint8_t *in, size_t in_len) { in RSA_public_key_from_bytes()
137 RSA *ret = RSA_parse_public_key(&cbs); in RSA_public_key_from_bytes()
139 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_ENCODING); in RSA_public_key_from_bytes()
[all …]
Drsa.c76 RSA *RSA_new(void) { return RSA_new_method(NULL); } in RSA_new()
78 RSA *RSA_new_method(const ENGINE *engine) { in RSA_new_method()
79 RSA *rsa = (RSA *)OPENSSL_malloc(sizeof(RSA)); in RSA_new_method()
81 OPENSSL_PUT_ERROR(RSA, ERR_R_MALLOC_FAILURE); in RSA_new_method()
85 memset(rsa, 0, sizeof(RSA)); in RSA_new_method()
125 void RSA_free(RSA *rsa) { in RSA_free()
167 int RSA_up_ref(RSA *rsa) { in RSA_up_ref()
172 int RSA_generate_key_ex(RSA *rsa, int bits, BIGNUM *e_value, BN_GENCB *cb) { in RSA_generate_key_ex()
180 int RSA_generate_multi_prime_key(RSA *rsa, int bits, int num_primes, in RSA_generate_multi_prime_key()
189 int RSA_encrypt(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out, in RSA_encrypt()
[all …]
Dpadding.c79 OPENSSL_PUT_ERROR(RSA, RSA_R_KEY_SIZE_TOO_SMALL); in RSA_padding_add_PKCS1_type_1()
84 OPENSSL_PUT_ERROR(RSA, RSA_R_DATA_TOO_LARGE_FOR_KEY_SIZE); in RSA_padding_add_PKCS1_type_1()
108 OPENSSL_PUT_ERROR(RSA, RSA_R_DATA_TOO_SMALL); in RSA_padding_check_PKCS1_type_1()
114 OPENSSL_PUT_ERROR(RSA, RSA_R_BLOCK_TYPE_IS_NOT_01); in RSA_padding_check_PKCS1_type_1()
127 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_FIXED_HEADER_DECRYPT); in RSA_padding_check_PKCS1_type_1()
135 OPENSSL_PUT_ERROR(RSA, RSA_R_NULL_BEFORE_BLOCK_MISSING); in RSA_padding_check_PKCS1_type_1()
140 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_PAD_BYTE_COUNT); in RSA_padding_check_PKCS1_type_1()
146 OPENSSL_PUT_ERROR(RSA, RSA_R_DATA_TOO_LARGE); in RSA_padding_check_PKCS1_type_1()
160 OPENSSL_PUT_ERROR(RSA, RSA_R_KEY_SIZE_TOO_SMALL); in RSA_padding_add_PKCS1_type_2()
165 OPENSSL_PUT_ERROR(RSA, RSA_R_DATA_TOO_LARGE_FOR_KEY_SIZE); in RSA_padding_add_PKCS1_type_2()
[all …]
Drsa_impl.c76 size_t rsa_default_size(const RSA *rsa) { in rsa_default_size()
80 int rsa_default_encrypt(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out, in rsa_default_encrypt()
89 OPENSSL_PUT_ERROR(RSA, RSA_R_MODULUS_TOO_LARGE); in rsa_default_encrypt()
94 OPENSSL_PUT_ERROR(RSA, RSA_R_OUTPUT_BUFFER_TOO_SMALL); in rsa_default_encrypt()
99 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_E_VALUE); in rsa_default_encrypt()
106 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_E_VALUE); in rsa_default_encrypt()
120 OPENSSL_PUT_ERROR(RSA, ERR_R_MALLOC_FAILURE); in rsa_default_encrypt()
137 OPENSSL_PUT_ERROR(RSA, RSA_R_UNKNOWN_PADDING_TYPE); in rsa_default_encrypt()
151 OPENSSL_PUT_ERROR(RSA, RSA_R_DATA_TOO_LARGE_FOR_MODULUS); in rsa_default_encrypt()
168 OPENSSL_PUT_ERROR(RSA, ERR_R_INTERNAL_ERROR); in rsa_default_encrypt()
[all …]
Dinternal.h72 size_t rsa_default_size(const RSA *rsa);
73 int rsa_default_encrypt(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out,
75 int rsa_default_sign_raw(RSA *rsa, size_t *out_len, uint8_t *out,
78 int rsa_default_decrypt(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out,
80 int rsa_default_verify_raw(RSA *rsa, size_t *out_len, uint8_t *out,
83 int rsa_default_private_transform(RSA *rsa, uint8_t *out, const uint8_t *in,
85 int rsa_default_multi_prime_keygen(RSA *rsa, int bits, int num_primes,
87 int rsa_default_keygen(RSA *rsa, int bits, BIGNUM *e_value, BN_GENCB *cb);
111 BN_BLINDING *rsa_setup_blinding(RSA *rsa, BN_CTX *in_ctx);
136 int RSA_private_transform(RSA *rsa, uint8_t *out, const uint8_t *in,
Dblinding.c142 OPENSSL_PUT_ERROR(RSA, ERR_R_MALLOC_FAILURE); in BN_BLINDING_new()
195 OPENSSL_PUT_ERROR(RSA, RSA_R_BN_NOT_INITIALIZED); in BN_BLINDING_update()
235 OPENSSL_PUT_ERROR(RSA, RSA_R_BN_NOT_INITIALIZED); in BN_BLINDING_convert_ex()
271 OPENSSL_PUT_ERROR(RSA, RSA_R_BN_NOT_INITIALIZED); in BN_BLINDING_invert_ex()
336 OPENSSL_PUT_ERROR(RSA, RSA_R_TOO_MANY_ITERATIONS); in BN_BLINDING_create_param()
402 BN_BLINDING *rsa_setup_blinding(RSA *rsa, BN_CTX *in_ctx) { in rsa_setup_blinding()
421 OPENSSL_PUT_ERROR(RSA, ERR_R_MALLOC_FAILURE); in rsa_setup_blinding()
428 OPENSSL_PUT_ERROR(RSA, RSA_R_NO_PUBLIC_EXPONENT); in rsa_setup_blinding()
448 OPENSSL_PUT_ERROR(RSA, ERR_R_BN_LIB); in rsa_setup_blinding()
/external/boringssl/src/crypto/x509/
Dx_all.c202 RSA *d2i_RSAPrivateKey_fp(FILE *fp, RSA **rsa) in d2i_RSAPrivateKey_fp()
204 return ASN1_d2i_fp_of(RSA, RSA_new, d2i_RSAPrivateKey, fp, rsa); in d2i_RSAPrivateKey_fp()
207 int i2d_RSAPrivateKey_fp(FILE *fp, RSA *rsa) in i2d_RSAPrivateKey_fp()
209 return ASN1_i2d_fp_of_const(RSA, i2d_RSAPrivateKey, fp, rsa); in i2d_RSAPrivateKey_fp()
212 RSA *d2i_RSAPublicKey_fp(FILE *fp, RSA **rsa) in d2i_RSAPublicKey_fp()
214 return ASN1_d2i_fp_of(RSA, RSA_new, d2i_RSAPublicKey, fp, rsa); in d2i_RSAPublicKey_fp()
217 RSA *d2i_RSA_PUBKEY_fp(FILE *fp, RSA **rsa) in d2i_RSA_PUBKEY_fp()
224 int i2d_RSAPublicKey_fp(FILE *fp, RSA *rsa) in i2d_RSAPublicKey_fp()
226 return ASN1_i2d_fp_of_const(RSA, i2d_RSAPublicKey, fp, rsa); in i2d_RSAPublicKey_fp()
229 int i2d_RSA_PUBKEY_fp(FILE *fp, RSA *rsa) in i2d_RSA_PUBKEY_fp()
[all …]
Dx_pubkey.c236 RSA *d2i_RSA_PUBKEY(RSA **a, const unsigned char **pp, in d2i_RSA_PUBKEY()
240 RSA *key; in d2i_RSA_PUBKEY()
257 int i2d_RSA_PUBKEY(const RSA *a, unsigned char **pp) in i2d_RSA_PUBKEY()
268 EVP_PKEY_set1_RSA(pktmp, (RSA*) a); in i2d_RSA_PUBKEY()
/external/boringssl/src/crypto/pem/
Dpem_all.c121 static RSA *pkey_get_rsa(EVP_PKEY *key, RSA **rsa);
142 static RSA *pkey_get_rsa(EVP_PKEY *key, RSA **rsa) in IMPLEMENT_PEM_rw()
144 RSA *rtmp; in IMPLEMENT_PEM_rw()
156 RSA *PEM_read_bio_RSAPrivateKey(BIO *bp, RSA **rsa, pem_password_cb *cb, in PEM_read_bio_RSAPrivateKey()
166 RSA *PEM_read_RSAPrivateKey(FILE *fp, RSA **rsa, pem_password_cb *cb, in PEM_read_RSAPrivateKey()
176 IMPLEMENT_PEM_write_cb_const(RSAPrivateKey, RSA, PEM_STRING_RSA, RSAPrivateKey) in IMPLEMENT_PEM_write_cb_const() argument
178 IMPLEMENT_PEM_rw_const(RSAPublicKey, RSA, PEM_STRING_RSA_PUBLIC, RSAPublicKey) in IMPLEMENT_PEM_write_cb_const()
179 IMPLEMENT_PEM_rw(RSA_PUBKEY, RSA, PEM_STRING_PUBLIC, RSA_PUBKEY) in IMPLEMENT_PEM_write_cb_const()
/external/boringssl/src/crypto/evp/
Devp_tests.txt5 # RSA 2048 bit key.
7 PrivateKey = RSA-2048
46 # RSA tests
48 Sign = RSA-2048
53 Verify = RSA-2048
59 Sign = RSA-2048
66 Sign = RSA-2048
73 Verify = RSA-2048
80 Verify = RSA-2048
87 Verify = RSA-2048
[all …]
/external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/
DREADME.rst1 Pure Python RSA implementation
4 `Python-RSA`_ is a pure-Python RSA implementation. It supports
10 Documentation can be found at the Python-RSA homepage:
27 .. _`Python-RSA`: http://stuvel.eu/rsa
/external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/doc/
Dcompatibility.rst7 Python-RSA implements encryption and signatures according to PKCS#1
8 version 1.5. This makes it compatible with the OpenSSL RSA module.
28 Python-RSA only, not compatible with any other known application.
35 You can create a 512-bit RSA key in OpenSSL as follows::
39 To get a Python-RSA-compatible public key from OpenSSL, you need the
56 v1.5 supported by Python-RSA. In order to extract a key from the
Dindex.rst1 .. Python-RSA documentation master file, created by
6 Welcome to Python-RSA's documentation!
9 Python-RSA is a pure-Python RSA implementation. It supports
24 This RSA implementation has seen the eyes of a security expert, and it
Dintro.rst4 Python-RSA's history starts in 2006. As a student assignment for the
5 University of Amsterdam we wrote a RSA implementation. We chose Python
12 It started out as just a module for calculating large primes, and RSA
23 wasn't compatible with other RSA implementations and used no random
Dusage.rst6 This section describes the usage of the Python-RSA module.
8 Before you can use RSA you need keys. You will receive a private key
93 Python-RSA version 3.0 introduced PKCS#1-style random padding. This
150 RSA can only encrypt messages that are smaller than the key. A couple
180 The core RSA algorithm operates on large integers. These operations
242 RSA can only encrypt messages that are smaller than the key. A couple
251 The most common way to use RSA with larger files uses a block cypher
253 the random key with RSA. You would send the encrypted file along with
262 #. :py:func:`Encrypt <rsa.encrypt>` the AES key with RSA
272 The Python-RSA module does not contain functionality to do the AES
[all …]
/external/ipsec-tools/src/racoon/
Drsalist.h52 RSA *rsa;
55 int rsa_key_insert(struct genlist *list, struct netaddr *src, struct netaddr *dst, RSA *rsa);
59 RSA *rsa_try_check_rsasign(vchar_t *source, vchar_t *sig, struct genlist *list);
Dcrypto_openssl.h63 extern int eay_check_rsasign __P((vchar_t *, vchar_t *, RSA *));
64 extern vchar_t *eay_get_rsasign __P((vchar_t *, RSA *));
67 extern vchar_t *eay_rsa_sign __P((vchar_t *, RSA *));
68 extern int eay_rsa_verify __P((vchar_t *, vchar_t *, RSA *));
220 RSA *base64_pubkey2rsa(char *in);
221 RSA *bignum_pubkey2rsa(BIGNUM *in);
/external/vboot_reference/scripts/
Dgenpadding.sh45 * arrays corresponding to various combinations of algorithms for RSA signatures.
56 * PKCS 1.5 padding (from the RSA PKCS#1 v2.1 standard)
58 * Depending on the RSA key size and hash function, the padding is calculated
73 * PS: octet string consisting of {Length(RSA Key) - Length(T) - 3} 0xFF
/external/bouncycastle/patches/
Dbcpkix.patch337 - addEntries(OIWObjectIdentifiers.md4WithRSA, "MD4", "RSA");
338 - addEntries(OIWObjectIdentifiers.md4WithRSAEncryption, "MD4", "RSA");
340 + // addEntries(OIWObjectIdentifiers.md4WithRSA, "MD4", "RSA");
341 + // addEntries(OIWObjectIdentifiers.md4WithRSAEncryption, "MD4", "RSA");
343 addEntries(OIWObjectIdentifiers.md5WithRSA, "MD5", "RSA");
344 addEntries(OIWObjectIdentifiers.sha1WithRSA, "SHA1", "RSA");
345 - addEntries(PKCSObjectIdentifiers.md2WithRSAEncryption, "MD2", "RSA");
346 - addEntries(PKCSObjectIdentifiers.md4WithRSAEncryption, "MD4", "RSA");
348 + // addEntries(PKCSObjectIdentifiers.md2WithRSAEncryption, "MD2", "RSA");
349 + // addEntries(PKCSObjectIdentifiers.md4WithRSAEncryption, "MD4", "RSA");
[all …]
/external/autotest/client/site_tests/firmware_VbootCrypto/
Dcontrol27 This test implements various RSA and SHA by creating and verifying various
29 and sha512 algorithms with key lengths of 1024, 2048, 4096, and 8192. RSA
35 'crypto', # RSA Signature Verification and SHA* Correctness.
/external/libmicrohttpd/src/testcurl/https/
Dhost2.key1 -----BEGIN RSA PRIVATE KEY-----
15 -----END RSA PRIVATE KEY-----
/external/boringssl/src/ssl/test/runner/
Dkey.pem1 -----BEGIN RSA PRIVATE KEY-----
15 -----END RSA PRIVATE KEY-----
/external/libmicrohttpd/src/datadir/
Dcert-and-key-for-wireshark.pem1 -----BEGIN RSA PRIVATE KEY-----
15 -----END RSA PRIVATE KEY-----

1234567