/external/boringssl/src/crypto/err/ |
D | rsa.errordata | 1 RSA,100,BAD_ENCODING 2 RSA,101,BAD_E_VALUE 3 RSA,102,BAD_FIXED_HEADER_DECRYPT 4 RSA,103,BAD_PAD_BYTE_COUNT 5 RSA,104,BAD_RSA_PARAMETERS 6 RSA,105,BAD_SIGNATURE 7 RSA,106,BAD_VERSION 8 RSA,107,BLOCK_TYPE_IS_NOT_01 9 RSA,108,BN_NOT_INITIALIZED 10 RSA,109,CANNOT_RECOVER_MULTI_PRIME_KEY [all …]
|
/external/boringssl/src/crypto/evp/ |
D | evp_tests.txt | 5 # RSA 2048 bit key. 6 PrivateKey = RSA-2048 7 Type = RSA 11 PublicKey = RSA-2048-SPKI 12 Type = RSA 16 PublicKey = RSA-2048-SPKI-Invalid 21 PublicKey = RSA-2048-SPKI-Invalid2 25 # RSA 512 bit key. 26 PrivateKey = RSA-512 27 Type = RSA [all …]
|
D | evp.c | 216 int EVP_PKEY_set1_RSA(EVP_PKEY *pkey, RSA *key) { in EVP_PKEY_set1_RSA() 224 int EVP_PKEY_assign_RSA(EVP_PKEY *pkey, RSA *key) { in EVP_PKEY_assign_RSA() 228 RSA *EVP_PKEY_get0_RSA(EVP_PKEY *pkey) { in EVP_PKEY_get0_RSA() 236 RSA *EVP_PKEY_get1_RSA(EVP_PKEY *pkey) { in EVP_PKEY_get1_RSA() 237 RSA *rsa = EVP_PKEY_get0_RSA(pkey); in EVP_PKEY_get1_RSA()
|
/external/boringssl/src/include/openssl/ |
D | rsa.h | 77 OPENSSL_EXPORT RSA *RSA_new(void); 80 OPENSSL_EXPORT RSA *RSA_new_method(const ENGINE *engine); 84 OPENSSL_EXPORT void RSA_free(RSA *rsa); 87 OPENSSL_EXPORT int RSA_up_ref(RSA *rsa); 95 OPENSSL_EXPORT void RSA_get0_key(const RSA *rsa, const BIGNUM **out_n, 100 OPENSSL_EXPORT void RSA_get0_factors(const RSA *rsa, const BIGNUM **out_p, 107 OPENSSL_EXPORT void RSA_get0_crt_params(const RSA *rsa, const BIGNUM **out_dmp1, 122 OPENSSL_EXPORT int RSA_generate_key_ex(RSA *rsa, int bits, BIGNUM *e, 128 OPENSSL_EXPORT int RSA_generate_key_fips(RSA *rsa, int bits, BN_GENCB *cb); 149 OPENSSL_EXPORT int RSA_encrypt(RSA *rsa, size_t *out_len, uint8_t *out, [all …]
|
D | x509.h | 613 OPENSSL_EXPORT RSA *d2i_RSAPrivateKey_fp(FILE *fp,RSA **rsa); 614 OPENSSL_EXPORT int i2d_RSAPrivateKey_fp(FILE *fp,RSA *rsa); 615 OPENSSL_EXPORT RSA *d2i_RSAPublicKey_fp(FILE *fp,RSA **rsa); 616 OPENSSL_EXPORT int i2d_RSAPublicKey_fp(FILE *fp,RSA *rsa); 617 OPENSSL_EXPORT RSA *d2i_RSA_PUBKEY_fp(FILE *fp,RSA **rsa); 618 OPENSSL_EXPORT int i2d_RSA_PUBKEY_fp(FILE *fp,RSA *rsa); 647 OPENSSL_EXPORT RSA *d2i_RSAPrivateKey_bio(BIO *bp,RSA **rsa); 648 OPENSSL_EXPORT int i2d_RSAPrivateKey_bio(BIO *bp,RSA *rsa); 649 OPENSSL_EXPORT RSA *d2i_RSAPublicKey_bio(BIO *bp,RSA **rsa); 650 OPENSSL_EXPORT int i2d_RSAPublicKey_bio(BIO *bp,RSA *rsa); [all …]
|
/external/boringssl/src/crypto/rsa_extra/ |
D | rsa_asn1.c | 91 OPENSSL_PUT_ERROR(RSA, RSA_R_VALUE_MISSING); in marshal_integer() 97 static RSA *parse_public_key(CBS *cbs, int buggy) { in parse_public_key() 98 RSA *ret = RSA_new(); in parse_public_key() 107 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_ENCODING); in parse_public_key() 114 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_RSA_PARAMETERS); in parse_public_key() 122 RSA *RSA_parse_public_key(CBS *cbs) { in RSA_parse_public_key() 126 RSA *RSA_parse_public_key_buggy(CBS *cbs) { in RSA_parse_public_key_buggy() 134 RSA *RSA_public_key_from_bytes(const uint8_t *in, size_t in_len) { in RSA_public_key_from_bytes() 137 RSA *ret = RSA_parse_public_key(&cbs); in RSA_public_key_from_bytes() 139 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_ENCODING); in RSA_public_key_from_bytes() [all …]
|
D | rsa_test.cc | 395 bssl::UniquePtr<RSA> key( in TEST_P() 462 bssl::UniquePtr<RSA> rsa( in TEST() 477 bssl::UniquePtr<RSA> rsa( in TEST() 483 bssl::UniquePtr<RSA> pub( in TEST() 490 bssl::UniquePtr<RSA> rsa(RSA_new()); in TEST() 514 bssl::UniquePtr<RSA> key(RSA_new()); in TEST() 546 bssl::UniquePtr<RSA> key(RSA_new()); in TEST() 567 bssl::UniquePtr<RSA> key2(RSA_new()); in TEST() 584 bssl::UniquePtr<RSA> rsa( in TEST() 635 bssl::UniquePtr<RSA> rsa( in TEST() [all …]
|
/external/boringssl/src/crypto/fipsmodule/rsa/ |
D | rsa.c | 81 RSA *RSA_new(void) { return RSA_new_method(NULL); } in RSA_new() 83 RSA *RSA_new_method(const ENGINE *engine) { in RSA_new_method() 84 RSA *rsa = OPENSSL_malloc(sizeof(RSA)); in RSA_new_method() 86 OPENSSL_PUT_ERROR(RSA, ERR_R_MALLOC_FAILURE); in RSA_new_method() 90 OPENSSL_memset(rsa, 0, sizeof(RSA)); in RSA_new_method() 117 void RSA_free(RSA *rsa) { in RSA_free() 155 int RSA_up_ref(RSA *rsa) { in RSA_up_ref() 160 void RSA_get0_key(const RSA *rsa, const BIGNUM **out_n, const BIGNUM **out_e, in RSA_get0_key() 173 void RSA_get0_factors(const RSA *rsa, const BIGNUM **out_p, in RSA_get0_factors() 183 void RSA_get0_crt_params(const RSA *rsa, const BIGNUM **out_dmp1, in RSA_get0_crt_params() [all …]
|
D | rsa_impl.c | 75 static int check_modulus_and_exponent_sizes(const RSA *rsa) { in check_modulus_and_exponent_sizes() 79 OPENSSL_PUT_ERROR(RSA, RSA_R_MODULUS_TOO_LARGE); in check_modulus_and_exponent_sizes() 95 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_E_VALUE); in check_modulus_and_exponent_sizes() 104 OPENSSL_PUT_ERROR(RSA, RSA_R_KEY_SIZE_TOO_SMALL); in check_modulus_and_exponent_sizes() 112 size_t rsa_default_size(const RSA *rsa) { in rsa_default_size() 116 int RSA_encrypt(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out, in RSA_encrypt() 119 OPENSSL_PUT_ERROR(RSA, RSA_R_VALUE_MISSING); in RSA_encrypt() 130 OPENSSL_PUT_ERROR(RSA, RSA_R_OUTPUT_BUFFER_TOO_SMALL); in RSA_encrypt() 148 OPENSSL_PUT_ERROR(RSA, ERR_R_MALLOC_FAILURE); in RSA_encrypt() 165 OPENSSL_PUT_ERROR(RSA, RSA_R_UNKNOWN_PADDING_TYPE); in RSA_encrypt() [all …]
|
D | padding.c | 79 OPENSSL_PUT_ERROR(RSA, RSA_R_KEY_SIZE_TOO_SMALL); in RSA_padding_add_PKCS1_type_1() 84 OPENSSL_PUT_ERROR(RSA, RSA_R_DIGEST_TOO_BIG_FOR_RSA_KEY); in RSA_padding_add_PKCS1_type_1() 102 OPENSSL_PUT_ERROR(RSA, RSA_R_DATA_TOO_SMALL); in RSA_padding_check_PKCS1_type_1() 108 OPENSSL_PUT_ERROR(RSA, RSA_R_BLOCK_TYPE_IS_NOT_01); in RSA_padding_check_PKCS1_type_1() 120 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_FIXED_HEADER_DECRYPT); in RSA_padding_check_PKCS1_type_1() 126 OPENSSL_PUT_ERROR(RSA, RSA_R_NULL_BEFORE_BLOCK_MISSING); in RSA_padding_check_PKCS1_type_1() 131 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_PAD_BYTE_COUNT); in RSA_padding_check_PKCS1_type_1() 139 OPENSSL_PUT_ERROR(RSA, RSA_R_DATA_TOO_LARGE); in RSA_padding_check_PKCS1_type_1() 168 OPENSSL_PUT_ERROR(RSA, RSA_R_KEY_SIZE_TOO_SMALL); in RSA_padding_add_PKCS1_type_2() 173 OPENSSL_PUT_ERROR(RSA, RSA_R_DATA_TOO_LARGE); in RSA_padding_add_PKCS1_type_2() [all …]
|
D | blinding.c | 135 OPENSSL_PUT_ERROR(RSA, ERR_R_MALLOC_FAILURE); in BN_BLINDING_new() 224 OPENSSL_PUT_ERROR(RSA, ERR_R_INTERNAL_ERROR); in bn_blinding_create_param() 231 OPENSSL_PUT_ERROR(RSA, ERR_R_INTERNAL_ERROR); in bn_blinding_create_param() 241 OPENSSL_PUT_ERROR(RSA, ERR_R_INTERNAL_ERROR); in bn_blinding_create_param() 248 OPENSSL_PUT_ERROR(RSA, RSA_R_TOO_MANY_ITERATIONS); in bn_blinding_create_param() 255 OPENSSL_PUT_ERROR(RSA, ERR_R_INTERNAL_ERROR); in bn_blinding_create_param() 260 OPENSSL_PUT_ERROR(RSA, ERR_R_INTERNAL_ERROR); in bn_blinding_create_param()
|
D | internal.h | 74 size_t rsa_default_size(const RSA *rsa); 75 int rsa_default_sign_raw(RSA *rsa, size_t *out_len, uint8_t *out, 78 int rsa_default_decrypt(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out, 80 int rsa_default_private_transform(RSA *rsa, uint8_t *out, const uint8_t *in, 113 int RSA_private_transform(RSA *rsa, uint8_t *out, const uint8_t *in,
|
/external/boringssl/src/crypto/x509/ |
D | x_all.c | 202 RSA *d2i_RSAPrivateKey_fp(FILE *fp, RSA **rsa) in d2i_RSAPrivateKey_fp() 204 return ASN1_d2i_fp_of(RSA, RSA_new, d2i_RSAPrivateKey, fp, rsa); in d2i_RSAPrivateKey_fp() 207 int i2d_RSAPrivateKey_fp(FILE *fp, RSA *rsa) in i2d_RSAPrivateKey_fp() 209 return ASN1_i2d_fp_of_const(RSA, i2d_RSAPrivateKey, fp, rsa); in i2d_RSAPrivateKey_fp() 212 RSA *d2i_RSAPublicKey_fp(FILE *fp, RSA **rsa) in d2i_RSAPublicKey_fp() 214 return ASN1_d2i_fp_of(RSA, RSA_new, d2i_RSAPublicKey, fp, rsa); in d2i_RSAPublicKey_fp() 217 RSA *d2i_RSA_PUBKEY_fp(FILE *fp, RSA **rsa) in d2i_RSA_PUBKEY_fp() 224 int i2d_RSAPublicKey_fp(FILE *fp, RSA *rsa) in i2d_RSAPublicKey_fp() 226 return ASN1_i2d_fp_of_const(RSA, i2d_RSAPublicKey, fp, rsa); in i2d_RSAPublicKey_fp() 229 int i2d_RSA_PUBKEY_fp(FILE *fp, RSA *rsa) in i2d_RSA_PUBKEY_fp() [all …]
|
/external/boringssl/src/crypto/pem/ |
D | pem_all.c | 122 static RSA *pkey_get_rsa(EVP_PKEY *key, RSA **rsa); 137 static RSA *pkey_get_rsa(EVP_PKEY *key, RSA **rsa) in IMPLEMENT_PEM_rw() 139 RSA *rtmp; in IMPLEMENT_PEM_rw() 153 RSA *PEM_read_bio_RSAPrivateKey(BIO *bp, RSA **rsa, pem_password_cb *cb, in PEM_read_bio_RSAPrivateKey() 163 RSA *PEM_read_RSAPrivateKey(FILE *fp, RSA **rsa, pem_password_cb *cb, void *u) in PEM_read_RSAPrivateKey() 172 IMPLEMENT_PEM_write_cb_const(RSAPrivateKey, RSA, PEM_STRING_RSA, in IMPLEMENT_PEM_write_cb_const() argument 176 IMPLEMENT_PEM_rw_const(RSAPublicKey, RSA, PEM_STRING_RSA_PUBLIC, in IMPLEMENT_PEM_write_cb_const() 177 RSAPublicKey) IMPLEMENT_PEM_rw(RSA_PUBKEY, RSA, in IMPLEMENT_PEM_write_cb_const()
|
/external/wycheproof/doc/ |
D | rsa.md | 1 # RSA chapter 5 ## RSA key generation 7 **Default size:** If a library supports a key default size for RSA keys then 13 suggests that 2048-bit RSA keys provide a security strength of about 112 bits, 15 bit RSA keys. [ECRYPT II], Section 13.3 suggests at least 2432 bits for new 20 size smaller than 2048 bits. If a user really wants a small RSA key then such a 25 every implementation of the Java platform is required to implement RSA with both 36 ## RSA PKCS #1 v1.5 encryption 71 ## RSA OAEP 73 Manger describes an chosen ciphertext attack against RSA in [M01]. There are [all …]
|
/external/openssh/ |
D | rsa.h | 22 int rsa_public_encrypt(BIGNUM *, BIGNUM *, RSA *); 23 int rsa_private_decrypt(BIGNUM *, BIGNUM *, RSA *); 24 int rsa_generate_additional_parameters(RSA *);
|
/external/boringssl/src/decrepit/rsa/ |
D | rsa_decrepit.c | 64 RSA *RSA_generate_key(int bits, unsigned long e_value, void *callback, in RSA_generate_key() 69 RSA *rsa = RSA_new(); in RSA_generate_key() 88 int RSA_padding_add_PKCS1_PSS(RSA *rsa, uint8_t *EM, const uint8_t *mHash, in RSA_padding_add_PKCS1_PSS() 93 int RSA_verify_PKCS1_PSS(RSA *rsa, const uint8_t *mHash, const EVP_MD *Hash, in RSA_verify_PKCS1_PSS()
|
/external/python/cpython2/Lib/test/ |
D | badkey.pem | 1 -----BEGIN RSA PRIVATE KEY----- 3 -----END RSA PRIVATE KEY----- 21 -----BEGIN RSA PRIVATE KEY----- 23 -----END RSA PRIVATE KEY-----
|
D | badcert.pem | 1 -----BEGIN RSA PRIVATE KEY----- 15 -----END RSA PRIVATE KEY----- 19 -----BEGIN RSA PRIVATE KEY----- 33 -----END RSA PRIVATE KEY-----
|
/external/ipsec-tools/src/racoon/ |
D | rsalist.h | 52 RSA *rsa; 55 int rsa_key_insert(struct genlist *list, struct netaddr *src, struct netaddr *dst, RSA *rsa); 59 RSA *rsa_try_check_rsasign(vchar_t *source, vchar_t *sig, struct genlist *list);
|
D | crypto_openssl.h | 63 extern int eay_check_rsasign __P((vchar_t *, vchar_t *, RSA *)); 64 extern vchar_t *eay_get_rsasign __P((vchar_t *, RSA *)); 67 extern vchar_t *eay_rsa_sign __P((vchar_t *, RSA *)); 68 extern int eay_rsa_verify __P((vchar_t *, vchar_t *, RSA *)); 220 RSA *base64_pubkey2rsa(char *in); 221 RSA *bignum_pubkey2rsa(BIGNUM *in);
|
/external/openssh/regress/unittests/hostkeys/testdata/ |
D | known_hosts | 6 …vtkilIPPGt/6VzWMERgvaIQPJ/IE99X3+fjcAG56oAWwy29JX10lQMzBPU6XJIaN/zqpkb6qUBiAHBdLpxrFBBU0/w== RSA #1 13 …uo4yyYb+Pyx3G0vxdmAIiA4aANq38XweDucBC0TZkRWVHK+Gs5V/uV0z7N0axJvkkJujMLvST3CRiiWwlficBc6yVQ== RSA #2 20 …jxE6ZFVv8NKgck/AbRjcwlRFOcx9oKUxOrXRa0IoXlTq0kyjKCJfaHBKnGitZThknCPTbVmpATkm5xx6J0WEDozfoQ== RSA #3 27 …vF0ATdBbi4jeWefStlHNg0HLhnCY7NAfDIlRdaN9lm3Pqm2vmr+CkqwcJaSpycDg8nPN9yNAuD6pv7NDuUnECezojQ== RSA #5 41 …Nc+HVU73Qi7M4zHRvtjprPs3SOyLpf0J9sL1WiHBDwg2P0miHMCdqHDd5nVXkJB2d4eeecmgezGLa29NOHZjbza5yw== RSA #6 42 …Nc+HVU73Qi7M4zHRvtjprPs3SOyLpf0J9sL1WiHBDwg2P0miHMCdqHDd5nVXkJB2d4eeecmgezGLa29NOHZjbza5yw== RSA #6 43 …Nc+HVU73Qi7M4zHRvtjprPs3SOyLpf0J9sL1WiHBDwg2P0miHMCdqHDd5nVXkJB2d4eeecmgezGLa29NOHZjbza5yw== RSA #6
|
/external/avb/test/ |
D | avb_atx_generate_test_data | 54 openssl genpkey -algorithm RSA -pkeyopt rsa_keygen_bits:4096 -outform PEM \ 56 openssl genpkey -algorithm RSA -pkeyopt rsa_keygen_bits:4096 -outform PEM \ 58 openssl genpkey -algorithm RSA -pkeyopt rsa_keygen_bits:4096 -outform PEM \
|
/external/vboot_reference/scripts/ |
D | genpadding.sh | 45 * arrays corresponding to various combinations of algorithms for RSA signatures. 56 * PKCS 1.5 padding (from the RSA PKCS#1 v2.1 standard) 58 * Depending on the RSA key size and hash function, the padding is calculated 73 * PS: octet string consisting of {Length(RSA Key) - Length(T) - 3} 0xFF
|
/external/bouncycastle/patches/ |
D | bcpkix.patch | 337 - addEntries(OIWObjectIdentifiers.md4WithRSA, "MD4", "RSA"); 338 - addEntries(OIWObjectIdentifiers.md4WithRSAEncryption, "MD4", "RSA"); 340 + // addEntries(OIWObjectIdentifiers.md4WithRSA, "MD4", "RSA"); 341 + // addEntries(OIWObjectIdentifiers.md4WithRSAEncryption, "MD4", "RSA"); 343 addEntries(OIWObjectIdentifiers.md5WithRSA, "MD5", "RSA"); 344 addEntries(OIWObjectIdentifiers.sha1WithRSA, "SHA1", "RSA"); 345 - addEntries(PKCSObjectIdentifiers.md2WithRSAEncryption, "MD2", "RSA"); 346 - addEntries(PKCSObjectIdentifiers.md4WithRSAEncryption, "MD4", "RSA"); 348 + // addEntries(PKCSObjectIdentifiers.md2WithRSAEncryption, "MD2", "RSA"); 349 + // addEntries(PKCSObjectIdentifiers.md4WithRSAEncryption, "MD4", "RSA"); [all …]
|