Home
last modified time | relevance | path

Searched refs:RSA (Results 1 – 25 of 203) sorted by relevance

123456789

/external/boringssl/src/crypto/err/
Drsa.errordata1 RSA,100,BAD_ENCODING
2 RSA,101,BAD_E_VALUE
3 RSA,102,BAD_FIXED_HEADER_DECRYPT
4 RSA,103,BAD_PAD_BYTE_COUNT
5 RSA,104,BAD_RSA_PARAMETERS
6 RSA,105,BAD_SIGNATURE
7 RSA,106,BAD_VERSION
8 RSA,107,BLOCK_TYPE_IS_NOT_01
9 RSA,108,BN_NOT_INITIALIZED
10 RSA,109,CANNOT_RECOVER_MULTI_PRIME_KEY
[all …]
/external/boringssl/src/crypto/evp/
Devp_tests.txt5 # RSA 2048 bit key.
6 PrivateKey = RSA-2048
7 Type = RSA
11 PublicKey = RSA-2048-SPKI
12 Type = RSA
16 PublicKey = RSA-2048-SPKI-Invalid
21 PublicKey = RSA-2048-SPKI-Invalid2
25 # RSA 512 bit key.
26 PrivateKey = RSA-512
27 Type = RSA
[all …]
Devp.c216 int EVP_PKEY_set1_RSA(EVP_PKEY *pkey, RSA *key) { in EVP_PKEY_set1_RSA()
224 int EVP_PKEY_assign_RSA(EVP_PKEY *pkey, RSA *key) { in EVP_PKEY_assign_RSA()
228 RSA *EVP_PKEY_get0_RSA(EVP_PKEY *pkey) { in EVP_PKEY_get0_RSA()
236 RSA *EVP_PKEY_get1_RSA(EVP_PKEY *pkey) { in EVP_PKEY_get1_RSA()
237 RSA *rsa = EVP_PKEY_get0_RSA(pkey); in EVP_PKEY_get1_RSA()
/external/boringssl/src/include/openssl/
Drsa.h77 OPENSSL_EXPORT RSA *RSA_new(void);
80 OPENSSL_EXPORT RSA *RSA_new_method(const ENGINE *engine);
84 OPENSSL_EXPORT void RSA_free(RSA *rsa);
87 OPENSSL_EXPORT int RSA_up_ref(RSA *rsa);
95 OPENSSL_EXPORT void RSA_get0_key(const RSA *rsa, const BIGNUM **out_n,
100 OPENSSL_EXPORT void RSA_get0_factors(const RSA *rsa, const BIGNUM **out_p,
107 OPENSSL_EXPORT void RSA_get0_crt_params(const RSA *rsa, const BIGNUM **out_dmp1,
122 OPENSSL_EXPORT int RSA_generate_key_ex(RSA *rsa, int bits, BIGNUM *e,
128 OPENSSL_EXPORT int RSA_generate_key_fips(RSA *rsa, int bits, BN_GENCB *cb);
149 OPENSSL_EXPORT int RSA_encrypt(RSA *rsa, size_t *out_len, uint8_t *out,
[all …]
Dx509.h613 OPENSSL_EXPORT RSA *d2i_RSAPrivateKey_fp(FILE *fp,RSA **rsa);
614 OPENSSL_EXPORT int i2d_RSAPrivateKey_fp(FILE *fp,RSA *rsa);
615 OPENSSL_EXPORT RSA *d2i_RSAPublicKey_fp(FILE *fp,RSA **rsa);
616 OPENSSL_EXPORT int i2d_RSAPublicKey_fp(FILE *fp,RSA *rsa);
617 OPENSSL_EXPORT RSA *d2i_RSA_PUBKEY_fp(FILE *fp,RSA **rsa);
618 OPENSSL_EXPORT int i2d_RSA_PUBKEY_fp(FILE *fp,RSA *rsa);
647 OPENSSL_EXPORT RSA *d2i_RSAPrivateKey_bio(BIO *bp,RSA **rsa);
648 OPENSSL_EXPORT int i2d_RSAPrivateKey_bio(BIO *bp,RSA *rsa);
649 OPENSSL_EXPORT RSA *d2i_RSAPublicKey_bio(BIO *bp,RSA **rsa);
650 OPENSSL_EXPORT int i2d_RSAPublicKey_bio(BIO *bp,RSA *rsa);
[all …]
/external/boringssl/src/crypto/rsa_extra/
Drsa_asn1.c91 OPENSSL_PUT_ERROR(RSA, RSA_R_VALUE_MISSING); in marshal_integer()
97 static RSA *parse_public_key(CBS *cbs, int buggy) { in parse_public_key()
98 RSA *ret = RSA_new(); in parse_public_key()
107 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_ENCODING); in parse_public_key()
114 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_RSA_PARAMETERS); in parse_public_key()
122 RSA *RSA_parse_public_key(CBS *cbs) { in RSA_parse_public_key()
126 RSA *RSA_parse_public_key_buggy(CBS *cbs) { in RSA_parse_public_key_buggy()
134 RSA *RSA_public_key_from_bytes(const uint8_t *in, size_t in_len) { in RSA_public_key_from_bytes()
137 RSA *ret = RSA_parse_public_key(&cbs); in RSA_public_key_from_bytes()
139 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_ENCODING); in RSA_public_key_from_bytes()
[all …]
Drsa_test.cc395 bssl::UniquePtr<RSA> key( in TEST_P()
462 bssl::UniquePtr<RSA> rsa( in TEST()
477 bssl::UniquePtr<RSA> rsa( in TEST()
483 bssl::UniquePtr<RSA> pub( in TEST()
490 bssl::UniquePtr<RSA> rsa(RSA_new()); in TEST()
514 bssl::UniquePtr<RSA> key(RSA_new()); in TEST()
546 bssl::UniquePtr<RSA> key(RSA_new()); in TEST()
567 bssl::UniquePtr<RSA> key2(RSA_new()); in TEST()
584 bssl::UniquePtr<RSA> rsa( in TEST()
635 bssl::UniquePtr<RSA> rsa( in TEST()
[all …]
/external/boringssl/src/crypto/fipsmodule/rsa/
Drsa.c81 RSA *RSA_new(void) { return RSA_new_method(NULL); } in RSA_new()
83 RSA *RSA_new_method(const ENGINE *engine) { in RSA_new_method()
84 RSA *rsa = OPENSSL_malloc(sizeof(RSA)); in RSA_new_method()
86 OPENSSL_PUT_ERROR(RSA, ERR_R_MALLOC_FAILURE); in RSA_new_method()
90 OPENSSL_memset(rsa, 0, sizeof(RSA)); in RSA_new_method()
117 void RSA_free(RSA *rsa) { in RSA_free()
155 int RSA_up_ref(RSA *rsa) { in RSA_up_ref()
160 void RSA_get0_key(const RSA *rsa, const BIGNUM **out_n, const BIGNUM **out_e, in RSA_get0_key()
173 void RSA_get0_factors(const RSA *rsa, const BIGNUM **out_p, in RSA_get0_factors()
183 void RSA_get0_crt_params(const RSA *rsa, const BIGNUM **out_dmp1, in RSA_get0_crt_params()
[all …]
Drsa_impl.c75 static int check_modulus_and_exponent_sizes(const RSA *rsa) { in check_modulus_and_exponent_sizes()
79 OPENSSL_PUT_ERROR(RSA, RSA_R_MODULUS_TOO_LARGE); in check_modulus_and_exponent_sizes()
95 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_E_VALUE); in check_modulus_and_exponent_sizes()
104 OPENSSL_PUT_ERROR(RSA, RSA_R_KEY_SIZE_TOO_SMALL); in check_modulus_and_exponent_sizes()
112 size_t rsa_default_size(const RSA *rsa) { in rsa_default_size()
116 int RSA_encrypt(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out, in RSA_encrypt()
119 OPENSSL_PUT_ERROR(RSA, RSA_R_VALUE_MISSING); in RSA_encrypt()
130 OPENSSL_PUT_ERROR(RSA, RSA_R_OUTPUT_BUFFER_TOO_SMALL); in RSA_encrypt()
148 OPENSSL_PUT_ERROR(RSA, ERR_R_MALLOC_FAILURE); in RSA_encrypt()
165 OPENSSL_PUT_ERROR(RSA, RSA_R_UNKNOWN_PADDING_TYPE); in RSA_encrypt()
[all …]
Dpadding.c79 OPENSSL_PUT_ERROR(RSA, RSA_R_KEY_SIZE_TOO_SMALL); in RSA_padding_add_PKCS1_type_1()
84 OPENSSL_PUT_ERROR(RSA, RSA_R_DIGEST_TOO_BIG_FOR_RSA_KEY); in RSA_padding_add_PKCS1_type_1()
102 OPENSSL_PUT_ERROR(RSA, RSA_R_DATA_TOO_SMALL); in RSA_padding_check_PKCS1_type_1()
108 OPENSSL_PUT_ERROR(RSA, RSA_R_BLOCK_TYPE_IS_NOT_01); in RSA_padding_check_PKCS1_type_1()
120 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_FIXED_HEADER_DECRYPT); in RSA_padding_check_PKCS1_type_1()
126 OPENSSL_PUT_ERROR(RSA, RSA_R_NULL_BEFORE_BLOCK_MISSING); in RSA_padding_check_PKCS1_type_1()
131 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_PAD_BYTE_COUNT); in RSA_padding_check_PKCS1_type_1()
139 OPENSSL_PUT_ERROR(RSA, RSA_R_DATA_TOO_LARGE); in RSA_padding_check_PKCS1_type_1()
168 OPENSSL_PUT_ERROR(RSA, RSA_R_KEY_SIZE_TOO_SMALL); in RSA_padding_add_PKCS1_type_2()
173 OPENSSL_PUT_ERROR(RSA, RSA_R_DATA_TOO_LARGE); in RSA_padding_add_PKCS1_type_2()
[all …]
Dblinding.c135 OPENSSL_PUT_ERROR(RSA, ERR_R_MALLOC_FAILURE); in BN_BLINDING_new()
224 OPENSSL_PUT_ERROR(RSA, ERR_R_INTERNAL_ERROR); in bn_blinding_create_param()
231 OPENSSL_PUT_ERROR(RSA, ERR_R_INTERNAL_ERROR); in bn_blinding_create_param()
241 OPENSSL_PUT_ERROR(RSA, ERR_R_INTERNAL_ERROR); in bn_blinding_create_param()
248 OPENSSL_PUT_ERROR(RSA, RSA_R_TOO_MANY_ITERATIONS); in bn_blinding_create_param()
255 OPENSSL_PUT_ERROR(RSA, ERR_R_INTERNAL_ERROR); in bn_blinding_create_param()
260 OPENSSL_PUT_ERROR(RSA, ERR_R_INTERNAL_ERROR); in bn_blinding_create_param()
Dinternal.h74 size_t rsa_default_size(const RSA *rsa);
75 int rsa_default_sign_raw(RSA *rsa, size_t *out_len, uint8_t *out,
78 int rsa_default_decrypt(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out,
80 int rsa_default_private_transform(RSA *rsa, uint8_t *out, const uint8_t *in,
113 int RSA_private_transform(RSA *rsa, uint8_t *out, const uint8_t *in,
/external/boringssl/src/crypto/x509/
Dx_all.c202 RSA *d2i_RSAPrivateKey_fp(FILE *fp, RSA **rsa) in d2i_RSAPrivateKey_fp()
204 return ASN1_d2i_fp_of(RSA, RSA_new, d2i_RSAPrivateKey, fp, rsa); in d2i_RSAPrivateKey_fp()
207 int i2d_RSAPrivateKey_fp(FILE *fp, RSA *rsa) in i2d_RSAPrivateKey_fp()
209 return ASN1_i2d_fp_of_const(RSA, i2d_RSAPrivateKey, fp, rsa); in i2d_RSAPrivateKey_fp()
212 RSA *d2i_RSAPublicKey_fp(FILE *fp, RSA **rsa) in d2i_RSAPublicKey_fp()
214 return ASN1_d2i_fp_of(RSA, RSA_new, d2i_RSAPublicKey, fp, rsa); in d2i_RSAPublicKey_fp()
217 RSA *d2i_RSA_PUBKEY_fp(FILE *fp, RSA **rsa) in d2i_RSA_PUBKEY_fp()
224 int i2d_RSAPublicKey_fp(FILE *fp, RSA *rsa) in i2d_RSAPublicKey_fp()
226 return ASN1_i2d_fp_of_const(RSA, i2d_RSAPublicKey, fp, rsa); in i2d_RSAPublicKey_fp()
229 int i2d_RSA_PUBKEY_fp(FILE *fp, RSA *rsa) in i2d_RSA_PUBKEY_fp()
[all …]
/external/boringssl/src/crypto/pem/
Dpem_all.c122 static RSA *pkey_get_rsa(EVP_PKEY *key, RSA **rsa);
137 static RSA *pkey_get_rsa(EVP_PKEY *key, RSA **rsa) in IMPLEMENT_PEM_rw()
139 RSA *rtmp; in IMPLEMENT_PEM_rw()
153 RSA *PEM_read_bio_RSAPrivateKey(BIO *bp, RSA **rsa, pem_password_cb *cb, in PEM_read_bio_RSAPrivateKey()
163 RSA *PEM_read_RSAPrivateKey(FILE *fp, RSA **rsa, pem_password_cb *cb, void *u) in PEM_read_RSAPrivateKey()
172 IMPLEMENT_PEM_write_cb_const(RSAPrivateKey, RSA, PEM_STRING_RSA, in IMPLEMENT_PEM_write_cb_const() argument
176 IMPLEMENT_PEM_rw_const(RSAPublicKey, RSA, PEM_STRING_RSA_PUBLIC, in IMPLEMENT_PEM_write_cb_const()
177 RSAPublicKey) IMPLEMENT_PEM_rw(RSA_PUBKEY, RSA, in IMPLEMENT_PEM_write_cb_const()
/external/wycheproof/doc/
Drsa.md1 # RSA chapter
5 ## RSA key generation
7 **Default size:** If a library supports a key default size for RSA keys then
13 suggests that 2048-bit RSA keys provide a security strength of about 112 bits,
15 bit RSA keys. [ECRYPT II], Section 13.3 suggests at least 2432 bits for new
20 size smaller than 2048 bits. If a user really wants a small RSA key then such a
25 every implementation of the Java platform is required to implement RSA with both
36 ## RSA PKCS #1 v1.5 encryption
71 ## RSA OAEP
73 Manger describes an chosen ciphertext attack against RSA in [M01]. There are
[all …]
/external/openssh/
Drsa.h22 int rsa_public_encrypt(BIGNUM *, BIGNUM *, RSA *);
23 int rsa_private_decrypt(BIGNUM *, BIGNUM *, RSA *);
24 int rsa_generate_additional_parameters(RSA *);
/external/boringssl/src/decrepit/rsa/
Drsa_decrepit.c64 RSA *RSA_generate_key(int bits, unsigned long e_value, void *callback, in RSA_generate_key()
69 RSA *rsa = RSA_new(); in RSA_generate_key()
88 int RSA_padding_add_PKCS1_PSS(RSA *rsa, uint8_t *EM, const uint8_t *mHash, in RSA_padding_add_PKCS1_PSS()
93 int RSA_verify_PKCS1_PSS(RSA *rsa, const uint8_t *mHash, const EVP_MD *Hash, in RSA_verify_PKCS1_PSS()
/external/python/cpython2/Lib/test/
Dbadkey.pem1 -----BEGIN RSA PRIVATE KEY-----
3 -----END RSA PRIVATE KEY-----
21 -----BEGIN RSA PRIVATE KEY-----
23 -----END RSA PRIVATE KEY-----
Dbadcert.pem1 -----BEGIN RSA PRIVATE KEY-----
15 -----END RSA PRIVATE KEY-----
19 -----BEGIN RSA PRIVATE KEY-----
33 -----END RSA PRIVATE KEY-----
/external/ipsec-tools/src/racoon/
Drsalist.h52 RSA *rsa;
55 int rsa_key_insert(struct genlist *list, struct netaddr *src, struct netaddr *dst, RSA *rsa);
59 RSA *rsa_try_check_rsasign(vchar_t *source, vchar_t *sig, struct genlist *list);
Dcrypto_openssl.h63 extern int eay_check_rsasign __P((vchar_t *, vchar_t *, RSA *));
64 extern vchar_t *eay_get_rsasign __P((vchar_t *, RSA *));
67 extern vchar_t *eay_rsa_sign __P((vchar_t *, RSA *));
68 extern int eay_rsa_verify __P((vchar_t *, vchar_t *, RSA *));
220 RSA *base64_pubkey2rsa(char *in);
221 RSA *bignum_pubkey2rsa(BIGNUM *in);
/external/openssh/regress/unittests/hostkeys/testdata/
Dknown_hosts6 …vtkilIPPGt/6VzWMERgvaIQPJ/IE99X3+fjcAG56oAWwy29JX10lQMzBPU6XJIaN/zqpkb6qUBiAHBdLpxrFBBU0/w== RSA #1
13 …uo4yyYb+Pyx3G0vxdmAIiA4aANq38XweDucBC0TZkRWVHK+Gs5V/uV0z7N0axJvkkJujMLvST3CRiiWwlficBc6yVQ== RSA #2
20 …jxE6ZFVv8NKgck/AbRjcwlRFOcx9oKUxOrXRa0IoXlTq0kyjKCJfaHBKnGitZThknCPTbVmpATkm5xx6J0WEDozfoQ== RSA #3
27 …vF0ATdBbi4jeWefStlHNg0HLhnCY7NAfDIlRdaN9lm3Pqm2vmr+CkqwcJaSpycDg8nPN9yNAuD6pv7NDuUnECezojQ== RSA #5
41 …Nc+HVU73Qi7M4zHRvtjprPs3SOyLpf0J9sL1WiHBDwg2P0miHMCdqHDd5nVXkJB2d4eeecmgezGLa29NOHZjbza5yw== RSA #6
42 …Nc+HVU73Qi7M4zHRvtjprPs3SOyLpf0J9sL1WiHBDwg2P0miHMCdqHDd5nVXkJB2d4eeecmgezGLa29NOHZjbza5yw== RSA #6
43 …Nc+HVU73Qi7M4zHRvtjprPs3SOyLpf0J9sL1WiHBDwg2P0miHMCdqHDd5nVXkJB2d4eeecmgezGLa29NOHZjbza5yw== RSA #6
/external/avb/test/
Davb_atx_generate_test_data54 openssl genpkey -algorithm RSA -pkeyopt rsa_keygen_bits:4096 -outform PEM \
56 openssl genpkey -algorithm RSA -pkeyopt rsa_keygen_bits:4096 -outform PEM \
58 openssl genpkey -algorithm RSA -pkeyopt rsa_keygen_bits:4096 -outform PEM \
/external/vboot_reference/scripts/
Dgenpadding.sh45 * arrays corresponding to various combinations of algorithms for RSA signatures.
56 * PKCS 1.5 padding (from the RSA PKCS#1 v2.1 standard)
58 * Depending on the RSA key size and hash function, the padding is calculated
73 * PS: octet string consisting of {Length(RSA Key) - Length(T) - 3} 0xFF
/external/bouncycastle/patches/
Dbcpkix.patch337 - addEntries(OIWObjectIdentifiers.md4WithRSA, "MD4", "RSA");
338 - addEntries(OIWObjectIdentifiers.md4WithRSAEncryption, "MD4", "RSA");
340 + // addEntries(OIWObjectIdentifiers.md4WithRSA, "MD4", "RSA");
341 + // addEntries(OIWObjectIdentifiers.md4WithRSAEncryption, "MD4", "RSA");
343 addEntries(OIWObjectIdentifiers.md5WithRSA, "MD5", "RSA");
344 addEntries(OIWObjectIdentifiers.sha1WithRSA, "SHA1", "RSA");
345 - addEntries(PKCSObjectIdentifiers.md2WithRSAEncryption, "MD2", "RSA");
346 - addEntries(PKCSObjectIdentifiers.md4WithRSAEncryption, "MD4", "RSA");
348 + // addEntries(PKCSObjectIdentifiers.md2WithRSAEncryption, "MD2", "RSA");
349 + // addEntries(PKCSObjectIdentifiers.md4WithRSAEncryption, "MD4", "RSA");
[all …]

123456789