/external/boringssl/src/crypto/err/ |
D | rsa.errordata | 1 RSA,143,BAD_ENCODING 2 RSA,100,BAD_E_VALUE 3 RSA,101,BAD_FIXED_HEADER_DECRYPT 4 RSA,102,BAD_PAD_BYTE_COUNT 5 RSA,103,BAD_RSA_PARAMETERS 6 RSA,104,BAD_SIGNATURE 7 RSA,145,BAD_VERSION 8 RSA,105,BLOCK_TYPE_IS_NOT_01 9 RSA,106,BN_NOT_INITIALIZED 10 RSA,142,CANNOT_RECOVER_MULTI_PRIME_KEY [all …]
|
/external/boringssl/src/include/openssl/ |
D | rsa.h | 78 OPENSSL_EXPORT RSA *RSA_new(void); 81 OPENSSL_EXPORT RSA *RSA_new_method(const ENGINE *engine); 85 OPENSSL_EXPORT void RSA_free(RSA *rsa); 88 OPENSSL_EXPORT int RSA_up_ref(RSA *rsa); 101 OPENSSL_EXPORT int RSA_generate_key_ex(RSA *rsa, int bits, BIGNUM *e, 106 OPENSSL_EXPORT int RSA_generate_multi_prime_key(RSA *rsa, int bits, 129 OPENSSL_EXPORT int RSA_encrypt(RSA *rsa, size_t *out_len, uint8_t *out, 148 OPENSSL_EXPORT int RSA_decrypt(RSA *rsa, size_t *out_len, uint8_t *out, 162 uint8_t *to, RSA *rsa, int padding); 175 uint8_t *to, RSA *rsa, int padding); [all …]
|
/external/boringssl/src/crypto/rsa/ |
D | rsa_asn1.c | 91 OPENSSL_PUT_ERROR(RSA, RSA_R_VALUE_MISSING); in marshal_integer() 97 static RSA *parse_public_key(CBS *cbs, int buggy) { in parse_public_key() 98 RSA *ret = RSA_new(); in parse_public_key() 107 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_ENCODING); in parse_public_key() 114 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_RSA_PARAMETERS); in parse_public_key() 122 RSA *RSA_parse_public_key(CBS *cbs) { in RSA_parse_public_key() 126 RSA *RSA_parse_public_key_buggy(CBS *cbs) { in RSA_parse_public_key_buggy() 134 RSA *RSA_public_key_from_bytes(const uint8_t *in, size_t in_len) { in RSA_public_key_from_bytes() 137 RSA *ret = RSA_parse_public_key(&cbs); in RSA_public_key_from_bytes() 139 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_ENCODING); in RSA_public_key_from_bytes() [all …]
|
D | rsa.c | 76 RSA *RSA_new(void) { return RSA_new_method(NULL); } in RSA_new() 78 RSA *RSA_new_method(const ENGINE *engine) { in RSA_new_method() 79 RSA *rsa = (RSA *)OPENSSL_malloc(sizeof(RSA)); in RSA_new_method() 81 OPENSSL_PUT_ERROR(RSA, ERR_R_MALLOC_FAILURE); in RSA_new_method() 85 memset(rsa, 0, sizeof(RSA)); in RSA_new_method() 125 void RSA_free(RSA *rsa) { in RSA_free() 167 int RSA_up_ref(RSA *rsa) { in RSA_up_ref() 172 int RSA_generate_key_ex(RSA *rsa, int bits, BIGNUM *e_value, BN_GENCB *cb) { in RSA_generate_key_ex() 180 int RSA_generate_multi_prime_key(RSA *rsa, int bits, int num_primes, in RSA_generate_multi_prime_key() 189 int RSA_encrypt(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out, in RSA_encrypt() [all …]
|
D | padding.c | 79 OPENSSL_PUT_ERROR(RSA, RSA_R_KEY_SIZE_TOO_SMALL); in RSA_padding_add_PKCS1_type_1() 84 OPENSSL_PUT_ERROR(RSA, RSA_R_DATA_TOO_LARGE_FOR_KEY_SIZE); in RSA_padding_add_PKCS1_type_1() 108 OPENSSL_PUT_ERROR(RSA, RSA_R_DATA_TOO_SMALL); in RSA_padding_check_PKCS1_type_1() 114 OPENSSL_PUT_ERROR(RSA, RSA_R_BLOCK_TYPE_IS_NOT_01); in RSA_padding_check_PKCS1_type_1() 127 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_FIXED_HEADER_DECRYPT); in RSA_padding_check_PKCS1_type_1() 135 OPENSSL_PUT_ERROR(RSA, RSA_R_NULL_BEFORE_BLOCK_MISSING); in RSA_padding_check_PKCS1_type_1() 140 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_PAD_BYTE_COUNT); in RSA_padding_check_PKCS1_type_1() 146 OPENSSL_PUT_ERROR(RSA, RSA_R_DATA_TOO_LARGE); in RSA_padding_check_PKCS1_type_1() 160 OPENSSL_PUT_ERROR(RSA, RSA_R_KEY_SIZE_TOO_SMALL); in RSA_padding_add_PKCS1_type_2() 165 OPENSSL_PUT_ERROR(RSA, RSA_R_DATA_TOO_LARGE_FOR_KEY_SIZE); in RSA_padding_add_PKCS1_type_2() [all …]
|
D | rsa_impl.c | 76 size_t rsa_default_size(const RSA *rsa) { in rsa_default_size() 80 int rsa_default_encrypt(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out, in rsa_default_encrypt() 89 OPENSSL_PUT_ERROR(RSA, RSA_R_MODULUS_TOO_LARGE); in rsa_default_encrypt() 94 OPENSSL_PUT_ERROR(RSA, RSA_R_OUTPUT_BUFFER_TOO_SMALL); in rsa_default_encrypt() 99 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_E_VALUE); in rsa_default_encrypt() 106 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_E_VALUE); in rsa_default_encrypt() 120 OPENSSL_PUT_ERROR(RSA, ERR_R_MALLOC_FAILURE); in rsa_default_encrypt() 137 OPENSSL_PUT_ERROR(RSA, RSA_R_UNKNOWN_PADDING_TYPE); in rsa_default_encrypt() 151 OPENSSL_PUT_ERROR(RSA, RSA_R_DATA_TOO_LARGE_FOR_MODULUS); in rsa_default_encrypt() 168 OPENSSL_PUT_ERROR(RSA, ERR_R_INTERNAL_ERROR); in rsa_default_encrypt() [all …]
|
D | internal.h | 72 size_t rsa_default_size(const RSA *rsa); 73 int rsa_default_encrypt(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out, 75 int rsa_default_sign_raw(RSA *rsa, size_t *out_len, uint8_t *out, 78 int rsa_default_decrypt(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out, 80 int rsa_default_verify_raw(RSA *rsa, size_t *out_len, uint8_t *out, 83 int rsa_default_private_transform(RSA *rsa, uint8_t *out, const uint8_t *in, 85 int rsa_default_multi_prime_keygen(RSA *rsa, int bits, int num_primes, 87 int rsa_default_keygen(RSA *rsa, int bits, BIGNUM *e_value, BN_GENCB *cb); 111 BN_BLINDING *rsa_setup_blinding(RSA *rsa, BN_CTX *in_ctx); 136 int RSA_private_transform(RSA *rsa, uint8_t *out, const uint8_t *in,
|
D | blinding.c | 142 OPENSSL_PUT_ERROR(RSA, ERR_R_MALLOC_FAILURE); in BN_BLINDING_new() 195 OPENSSL_PUT_ERROR(RSA, RSA_R_BN_NOT_INITIALIZED); in BN_BLINDING_update() 235 OPENSSL_PUT_ERROR(RSA, RSA_R_BN_NOT_INITIALIZED); in BN_BLINDING_convert_ex() 271 OPENSSL_PUT_ERROR(RSA, RSA_R_BN_NOT_INITIALIZED); in BN_BLINDING_invert_ex() 336 OPENSSL_PUT_ERROR(RSA, RSA_R_TOO_MANY_ITERATIONS); in BN_BLINDING_create_param() 402 BN_BLINDING *rsa_setup_blinding(RSA *rsa, BN_CTX *in_ctx) { in rsa_setup_blinding() 421 OPENSSL_PUT_ERROR(RSA, ERR_R_MALLOC_FAILURE); in rsa_setup_blinding() 428 OPENSSL_PUT_ERROR(RSA, RSA_R_NO_PUBLIC_EXPONENT); in rsa_setup_blinding() 448 OPENSSL_PUT_ERROR(RSA, ERR_R_BN_LIB); in rsa_setup_blinding()
|
/external/boringssl/src/crypto/x509/ |
D | x_all.c | 202 RSA *d2i_RSAPrivateKey_fp(FILE *fp, RSA **rsa) in d2i_RSAPrivateKey_fp() 204 return ASN1_d2i_fp_of(RSA, RSA_new, d2i_RSAPrivateKey, fp, rsa); in d2i_RSAPrivateKey_fp() 207 int i2d_RSAPrivateKey_fp(FILE *fp, RSA *rsa) in i2d_RSAPrivateKey_fp() 209 return ASN1_i2d_fp_of_const(RSA, i2d_RSAPrivateKey, fp, rsa); in i2d_RSAPrivateKey_fp() 212 RSA *d2i_RSAPublicKey_fp(FILE *fp, RSA **rsa) in d2i_RSAPublicKey_fp() 214 return ASN1_d2i_fp_of(RSA, RSA_new, d2i_RSAPublicKey, fp, rsa); in d2i_RSAPublicKey_fp() 217 RSA *d2i_RSA_PUBKEY_fp(FILE *fp, RSA **rsa) in d2i_RSA_PUBKEY_fp() 224 int i2d_RSAPublicKey_fp(FILE *fp, RSA *rsa) in i2d_RSAPublicKey_fp() 226 return ASN1_i2d_fp_of_const(RSA, i2d_RSAPublicKey, fp, rsa); in i2d_RSAPublicKey_fp() 229 int i2d_RSA_PUBKEY_fp(FILE *fp, RSA *rsa) in i2d_RSA_PUBKEY_fp() [all …]
|
D | x_pubkey.c | 236 RSA *d2i_RSA_PUBKEY(RSA **a, const unsigned char **pp, in d2i_RSA_PUBKEY() 240 RSA *key; in d2i_RSA_PUBKEY() 257 int i2d_RSA_PUBKEY(const RSA *a, unsigned char **pp) in i2d_RSA_PUBKEY() 268 EVP_PKEY_set1_RSA(pktmp, (RSA*) a); in i2d_RSA_PUBKEY()
|
/external/boringssl/src/crypto/pem/ |
D | pem_all.c | 121 static RSA *pkey_get_rsa(EVP_PKEY *key, RSA **rsa); 142 static RSA *pkey_get_rsa(EVP_PKEY *key, RSA **rsa) in IMPLEMENT_PEM_rw() 144 RSA *rtmp; in IMPLEMENT_PEM_rw() 156 RSA *PEM_read_bio_RSAPrivateKey(BIO *bp, RSA **rsa, pem_password_cb *cb, in PEM_read_bio_RSAPrivateKey() 166 RSA *PEM_read_RSAPrivateKey(FILE *fp, RSA **rsa, pem_password_cb *cb, in PEM_read_RSAPrivateKey() 176 IMPLEMENT_PEM_write_cb_const(RSAPrivateKey, RSA, PEM_STRING_RSA, RSAPrivateKey) in IMPLEMENT_PEM_write_cb_const() argument 178 IMPLEMENT_PEM_rw_const(RSAPublicKey, RSA, PEM_STRING_RSA_PUBLIC, RSAPublicKey) in IMPLEMENT_PEM_write_cb_const() 179 IMPLEMENT_PEM_rw(RSA_PUBKEY, RSA, PEM_STRING_PUBLIC, RSA_PUBKEY) in IMPLEMENT_PEM_write_cb_const()
|
/external/boringssl/src/crypto/evp/ |
D | evp_tests.txt | 5 # RSA 2048 bit key. 7 PrivateKey = RSA-2048 46 # RSA tests 48 Sign = RSA-2048 53 Verify = RSA-2048 59 Sign = RSA-2048 66 Sign = RSA-2048 73 Verify = RSA-2048 80 Verify = RSA-2048 87 Verify = RSA-2048 [all …]
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/ |
D | README.rst | 1 Pure Python RSA implementation 4 `Python-RSA`_ is a pure-Python RSA implementation. It supports 10 Documentation can be found at the Python-RSA homepage: 27 .. _`Python-RSA`: http://stuvel.eu/rsa
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/doc/ |
D | compatibility.rst | 7 Python-RSA implements encryption and signatures according to PKCS#1 8 version 1.5. This makes it compatible with the OpenSSL RSA module. 28 Python-RSA only, not compatible with any other known application. 35 You can create a 512-bit RSA key in OpenSSL as follows:: 39 To get a Python-RSA-compatible public key from OpenSSL, you need the 56 v1.5 supported by Python-RSA. In order to extract a key from the
|
D | index.rst | 1 .. Python-RSA documentation master file, created by 6 Welcome to Python-RSA's documentation! 9 Python-RSA is a pure-Python RSA implementation. It supports 24 This RSA implementation has seen the eyes of a security expert, and it
|
D | intro.rst | 4 Python-RSA's history starts in 2006. As a student assignment for the 5 University of Amsterdam we wrote a RSA implementation. We chose Python 12 It started out as just a module for calculating large primes, and RSA 23 wasn't compatible with other RSA implementations and used no random
|
D | usage.rst | 6 This section describes the usage of the Python-RSA module. 8 Before you can use RSA you need keys. You will receive a private key 93 Python-RSA version 3.0 introduced PKCS#1-style random padding. This 150 RSA can only encrypt messages that are smaller than the key. A couple 180 The core RSA algorithm operates on large integers. These operations 242 RSA can only encrypt messages that are smaller than the key. A couple 251 The most common way to use RSA with larger files uses a block cypher 253 the random key with RSA. You would send the encrypted file along with 262 #. :py:func:`Encrypt <rsa.encrypt>` the AES key with RSA 272 The Python-RSA module does not contain functionality to do the AES [all …]
|
/external/ipsec-tools/src/racoon/ |
D | rsalist.h | 52 RSA *rsa; 55 int rsa_key_insert(struct genlist *list, struct netaddr *src, struct netaddr *dst, RSA *rsa); 59 RSA *rsa_try_check_rsasign(vchar_t *source, vchar_t *sig, struct genlist *list);
|
D | crypto_openssl.h | 63 extern int eay_check_rsasign __P((vchar_t *, vchar_t *, RSA *)); 64 extern vchar_t *eay_get_rsasign __P((vchar_t *, RSA *)); 67 extern vchar_t *eay_rsa_sign __P((vchar_t *, RSA *)); 68 extern int eay_rsa_verify __P((vchar_t *, vchar_t *, RSA *)); 220 RSA *base64_pubkey2rsa(char *in); 221 RSA *bignum_pubkey2rsa(BIGNUM *in);
|
/external/vboot_reference/scripts/ |
D | genpadding.sh | 45 * arrays corresponding to various combinations of algorithms for RSA signatures. 56 * PKCS 1.5 padding (from the RSA PKCS#1 v2.1 standard) 58 * Depending on the RSA key size and hash function, the padding is calculated 73 * PS: octet string consisting of {Length(RSA Key) - Length(T) - 3} 0xFF
|
/external/bouncycastle/patches/ |
D | bcpkix.patch | 337 - addEntries(OIWObjectIdentifiers.md4WithRSA, "MD4", "RSA"); 338 - addEntries(OIWObjectIdentifiers.md4WithRSAEncryption, "MD4", "RSA"); 340 + // addEntries(OIWObjectIdentifiers.md4WithRSA, "MD4", "RSA"); 341 + // addEntries(OIWObjectIdentifiers.md4WithRSAEncryption, "MD4", "RSA"); 343 addEntries(OIWObjectIdentifiers.md5WithRSA, "MD5", "RSA"); 344 addEntries(OIWObjectIdentifiers.sha1WithRSA, "SHA1", "RSA"); 345 - addEntries(PKCSObjectIdentifiers.md2WithRSAEncryption, "MD2", "RSA"); 346 - addEntries(PKCSObjectIdentifiers.md4WithRSAEncryption, "MD4", "RSA"); 348 + // addEntries(PKCSObjectIdentifiers.md2WithRSAEncryption, "MD2", "RSA"); 349 + // addEntries(PKCSObjectIdentifiers.md4WithRSAEncryption, "MD4", "RSA"); [all …]
|
/external/autotest/client/site_tests/firmware_VbootCrypto/ |
D | control | 27 This test implements various RSA and SHA by creating and verifying various 29 and sha512 algorithms with key lengths of 1024, 2048, 4096, and 8192. RSA 35 'crypto', # RSA Signature Verification and SHA* Correctness.
|
/external/libmicrohttpd/src/testcurl/https/ |
D | host2.key | 1 -----BEGIN RSA PRIVATE KEY----- 15 -----END RSA PRIVATE KEY-----
|
/external/boringssl/src/ssl/test/runner/ |
D | key.pem | 1 -----BEGIN RSA PRIVATE KEY----- 15 -----END RSA PRIVATE KEY-----
|
/external/libmicrohttpd/src/datadir/ |
D | cert-and-key-for-wireshark.pem | 1 -----BEGIN RSA PRIVATE KEY----- 15 -----END RSA PRIVATE KEY-----
|