/external/boringssl/src/crypto/err/ |
D | rsa.errordata | 1 RSA,100,BAD_ENCODING 2 RSA,101,BAD_E_VALUE 3 RSA,102,BAD_FIXED_HEADER_DECRYPT 4 RSA,103,BAD_PAD_BYTE_COUNT 5 RSA,104,BAD_RSA_PARAMETERS 6 RSA,105,BAD_SIGNATURE 7 RSA,106,BAD_VERSION 8 RSA,107,BLOCK_TYPE_IS_NOT_01 9 RSA,148,BLOCK_TYPE_IS_NOT_02 10 RSA,108,BN_NOT_INITIALIZED [all …]
|
/external/boringssl/src/crypto/evp/ |
D | evp_tests.txt | 5 # RSA 2048 bit key. 6 PrivateKey = RSA-2048 7 Type = RSA 11 PublicKey = RSA-2048-SPKI 12 Type = RSA 15 # The same key but with a negative RSA modulus. 16 PublicKey = RSA-2048-SPKI-Negative 21 PublicKey = RSA-2048-SPKI-Invalid 26 PublicKey = RSA-2048-SPKI-Invalid2 30 # RSA 512 bit key. [all …]
|
/external/boringssl/src/include/openssl/ |
D | rsa.h | 83 OPENSSL_EXPORT RSA *RSA_new(void); 86 OPENSSL_EXPORT RSA *RSA_new_method(const ENGINE *engine); 90 OPENSSL_EXPORT void RSA_free(RSA *rsa); 94 OPENSSL_EXPORT int RSA_up_ref(RSA *rsa); 100 OPENSSL_EXPORT unsigned RSA_bits(const RSA *rsa); 105 OPENSSL_EXPORT void RSA_get0_key(const RSA *rsa, const BIGNUM **out_n, 110 OPENSSL_EXPORT void RSA_get0_factors(const RSA *rsa, const BIGNUM **out_p, 117 OPENSSL_EXPORT void RSA_get0_crt_params(const RSA *rsa, const BIGNUM **out_dmp1, 130 OPENSSL_EXPORT int RSA_set0_key(RSA *rsa, BIGNUM *n, BIGNUM *e, BIGNUM *d); 140 OPENSSL_EXPORT int RSA_set0_factors(RSA *rsa, BIGNUM *p, BIGNUM *q); [all …]
|
/external/boringssl/src/crypto/rsa_extra/ |
D | rsa_asn1.c | 84 OPENSSL_PUT_ERROR(RSA, RSA_R_VALUE_MISSING); in marshal_integer() 90 RSA *RSA_parse_public_key(CBS *cbs) { in RSA_parse_public_key() 91 RSA *ret = RSA_new(); in RSA_parse_public_key() 100 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_ENCODING); in RSA_parse_public_key() 107 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_RSA_PARAMETERS); in RSA_parse_public_key() 115 RSA *RSA_public_key_from_bytes(const uint8_t *in, size_t in_len) { in RSA_public_key_from_bytes() 118 RSA *ret = RSA_parse_public_key(&cbs); in RSA_public_key_from_bytes() 120 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_ENCODING); in RSA_public_key_from_bytes() 127 int RSA_marshal_public_key(CBB *cbb, const RSA *rsa) { in RSA_marshal_public_key() 133 OPENSSL_PUT_ERROR(RSA, RSA_R_ENCODE_ERROR); in RSA_marshal_public_key() [all …]
|
D | rsa_test.cc | 400 bssl::UniquePtr<RSA> key( in TEST_P() 467 bssl::UniquePtr<RSA> rsa( in TEST() 482 bssl::UniquePtr<RSA> rsa( in TEST() 488 bssl::UniquePtr<RSA> pub( in TEST() 495 bssl::UniquePtr<RSA> rsa(RSA_new()); in TEST() 519 bssl::UniquePtr<RSA> key(RSA_new()); in TEST() 551 bssl::UniquePtr<RSA> key(RSA_new()); in TEST() 572 bssl::UniquePtr<RSA> key2(RSA_new()); in TEST() 589 bssl::UniquePtr<RSA> rsa( in TEST() 633 bssl::UniquePtr<RSA> rsa( in TEST() [all …]
|
/external/boringssl/src/crypto/fipsmodule/rsa/ |
D | rsa.c | 81 OPENSSL_DECLARE_ERROR_REASON(RSA, BLOCK_TYPE_IS_NOT_02) in OPENSSL_DECLARE_ERROR_REASON() argument 85 RSA *RSA_new(void) { return RSA_new_method(NULL); } in OPENSSL_DECLARE_ERROR_REASON() 87 RSA *RSA_new_method(const ENGINE *engine) { in RSA_new_method() 88 RSA *rsa = OPENSSL_malloc(sizeof(RSA)); in RSA_new_method() 90 OPENSSL_PUT_ERROR(RSA, ERR_R_MALLOC_FAILURE); in RSA_new_method() 94 OPENSSL_memset(rsa, 0, sizeof(RSA)); in RSA_new_method() 121 void RSA_free(RSA *rsa) { in RSA_free() 163 int RSA_up_ref(RSA *rsa) { in RSA_up_ref() 168 unsigned RSA_bits(const RSA *rsa) { return BN_num_bits(rsa->n); } in RSA_bits() 170 void RSA_get0_key(const RSA *rsa, const BIGNUM **out_n, const BIGNUM **out_e, in RSA_get0_key() [all …]
|
D | padding.c | 79 OPENSSL_PUT_ERROR(RSA, RSA_R_KEY_SIZE_TOO_SMALL); in RSA_padding_add_PKCS1_type_1() 84 OPENSSL_PUT_ERROR(RSA, RSA_R_DIGEST_TOO_BIG_FOR_RSA_KEY); in RSA_padding_add_PKCS1_type_1() 102 OPENSSL_PUT_ERROR(RSA, RSA_R_DATA_TOO_SMALL); in RSA_padding_check_PKCS1_type_1() 108 OPENSSL_PUT_ERROR(RSA, RSA_R_BLOCK_TYPE_IS_NOT_01); in RSA_padding_check_PKCS1_type_1() 120 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_FIXED_HEADER_DECRYPT); in RSA_padding_check_PKCS1_type_1() 126 OPENSSL_PUT_ERROR(RSA, RSA_R_NULL_BEFORE_BLOCK_MISSING); in RSA_padding_check_PKCS1_type_1() 131 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_PAD_BYTE_COUNT); in RSA_padding_check_PKCS1_type_1() 139 OPENSSL_PUT_ERROR(RSA, RSA_R_DATA_TOO_LARGE); in RSA_padding_check_PKCS1_type_1() 168 OPENSSL_PUT_ERROR(RSA, RSA_R_KEY_SIZE_TOO_SMALL); in RSA_padding_add_PKCS1_type_2() 173 OPENSSL_PUT_ERROR(RSA, RSA_R_DATA_TOO_LARGE_FOR_KEY_SIZE); in RSA_padding_add_PKCS1_type_2() [all …]
|
D | rsa_impl.c | 75 static int check_modulus_and_exponent_sizes(const RSA *rsa) { in check_modulus_and_exponent_sizes() 79 OPENSSL_PUT_ERROR(RSA, RSA_R_MODULUS_TOO_LARGE); in check_modulus_and_exponent_sizes() 95 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_E_VALUE); in check_modulus_and_exponent_sizes() 104 OPENSSL_PUT_ERROR(RSA, RSA_R_KEY_SIZE_TOO_SMALL); in check_modulus_and_exponent_sizes() 132 static int freeze_private_key(RSA *rsa, BN_CTX *ctx) { in freeze_private_key() 249 size_t rsa_default_size(const RSA *rsa) { in rsa_default_size() 253 int RSA_encrypt(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out, in RSA_encrypt() 256 OPENSSL_PUT_ERROR(RSA, RSA_R_VALUE_MISSING); in RSA_encrypt() 267 OPENSSL_PUT_ERROR(RSA, RSA_R_OUTPUT_BUFFER_TOO_SMALL); in RSA_encrypt() 285 OPENSSL_PUT_ERROR(RSA, ERR_R_MALLOC_FAILURE); in RSA_encrypt() [all …]
|
D | internal.h | 74 size_t rsa_default_size(const RSA *rsa); 75 int rsa_default_sign_raw(RSA *rsa, size_t *out_len, uint8_t *out, 78 int rsa_default_decrypt(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out, 80 int rsa_default_private_transform(RSA *rsa, uint8_t *out, const uint8_t *in, 113 int RSA_private_transform(RSA *rsa, uint8_t *out, const uint8_t *in,
|
/external/curl/docs/ |
D | CIPHERS.md | 33 `DH-RSA-DES-CBC3-SHA` 35 `DHE-RSA-DES-CBC3-SHA` 48 `DHE-RSA-DES-CBC3-SHA` 58 `DH-RSA-AES128-SHA` 59 `DH-RSA-AES256-SHA` 62 `DHE-RSA-AES128-SHA` 63 `DHE-RSA-AES256-SHA` 71 `DH-RSA-SEED-SHA` 73 `DHE-RSA-SEED-SHA` 85 `ECDHE-RSA-NULL-SHA` [all …]
|
/external/u-boot/lib/rsa/ |
D | Kconfig | 1 config RSA config 2 bool "Use RSA Library" 6 RSA support. This enables the RSA algorithm used for FIT image 9 The Modular Exponentiation algorithm in RSA is implemented using 16 if RSA 19 bool "Use RSA Library within SPL" 22 bool "Enable driver for RSA Modular Exponentiation in software" 25 Enables driver for modular exponentiation in software. This is a RSA 26 algorithm used in FIT image verification. It required RSA Key as 31 bool "Enable RSA Modular Exponentiation with FSL crypto accelerator" [all …]
|
D | rsa-sign.c | 24 static void RSA_get0_key(const RSA *r, in RSA_get0_key() 55 static int rsa_pem_get_pub_key(const char *keydir, const char *name, RSA **rsap) in rsa_pem_get_pub_key() 60 RSA *rsa; in rsa_pem_get_pub_key() 122 ENGINE *engine, RSA **rsap) in rsa_engine_get_pub_key() 127 RSA *rsa; in rsa_engine_get_pub_key() 180 ENGINE *engine, RSA **rsap) in rsa_get_pub_key() 196 RSA **rsap) in rsa_pem_get_priv_key() 199 RSA *rsa; in rsa_pem_get_priv_key() 233 ENGINE *engine, RSA **rsap) in rsa_engine_get_priv_key() 238 RSA *rsa; in rsa_engine_get_priv_key() [all …]
|
/external/boringssl/src/crypto/pem/ |
D | pem_all.c | 120 static RSA *pkey_get_rsa(EVP_PKEY *key, RSA **rsa); 136 static RSA *pkey_get_rsa(EVP_PKEY *key, RSA **rsa) in IMPLEMENT_PEM_rw() 138 RSA *rtmp; in IMPLEMENT_PEM_rw() 152 RSA *PEM_read_bio_RSAPrivateKey(BIO *bp, RSA **rsa, pem_password_cb *cb, in PEM_read_bio_RSAPrivateKey() 162 RSA *PEM_read_RSAPrivateKey(FILE *fp, RSA **rsa, pem_password_cb *cb, void *u) in PEM_read_RSAPrivateKey() 171 IMPLEMENT_PEM_write_cb_const(RSAPrivateKey, RSA, PEM_STRING_RSA, in IMPLEMENT_PEM_write_cb_const() argument 175 IMPLEMENT_PEM_rw_const(RSAPublicKey, RSA, PEM_STRING_RSA_PUBLIC, in IMPLEMENT_PEM_write_cb_const() 176 RSAPublicKey) IMPLEMENT_PEM_rw(RSA_PUBKEY, RSA, in IMPLEMENT_PEM_write_cb_const()
|
/external/wycheproof/doc/ |
D | rsa.md | 1 # RSA chapter 5 ## RSA key generation 7 **Default size:** If a library supports a key default size for RSA keys then 13 suggests that 2048-bit RSA keys provide a security strength of about 112 bits, 15 bit RSA keys. [ECRYPT II], Section 13.3 suggests at least 2432 bits for new 20 size smaller than 2048 bits. If a user really wants a small RSA key then such a 25 every implementation of the Java platform is required to implement RSA with both 36 ## RSA PKCS #1 v1.5 encryption 71 ## RSA OAEP 73 Manger describes an chosen ciphertext attack against RSA in [M01]. There are [all …]
|
/external/conscrypt/ |
D | CAPABILITIES.md | 128 * `RSA/ECB/NoPadding` 129 * `RSA/ECB/OAEPPadding` 130 * `RSA/ECB/OAEPWithSHA-1AndMGF1Padding` 131 * `RSA/ECB/OAEPWithSHA-224AndMGF1Padding` 132 * `RSA/ECB/OAEPWithSHA-256AndMGF1Padding` 133 * `RSA/ECB/OAEPWithSHA-384AndMGF1Padding` 134 * `RSA/ECB/OAEPWithSHA-512AndMGF1Padding` 135 * `RSA/ECB/PKCS1Padding` 137 Conscrypt's OAEP ciphers (eg, `RSA/ECB/OAEPWithSHA-256AndMGF1Padding`) use the named digest for 140 For maximum compatibility, you should use `RSA/ECB/OAEPPadding` and initialize it with an [all …]
|
/external/python/rsa/doc/ |
D | compatibility.rst | 7 Python-RSA implements encryption and signatures according to PKCS#1 8 version 1.5. This makes it compatible with the OpenSSL RSA module. 28 Deprecated in Python-RSA 3.4 and removed from Python-RSA 4.0. 29 Was Python-RSA only, not compatible with any other known application. 36 You can create a 512-bit RSA key in OpenSSL as follows:: 40 To get a Python-RSA-compatible public key from OpenSSL, you need the 57 v1.5 supported by Python-RSA. In order to extract a key from the
|
D | upgrading.rst | 4 From versions older than Python-RSA 4.0 9 Python-RSA 4.0. If you need this, or have ideas on how to do handle encryption 17 From versions older than Python-RSA 3.4 20 Previous versions of Python-RSA were less secure than the current 22 old versions will be available until Python-RSA 4.0. 48 of Python-RSA, and not as a way to keep using those old versions. 58 Version 3.0 introduced industrial standard RSA keys according to 60 older version of Python-RSA, use the following::
|
D | index.rst | 1 .. Python-RSA documentation master file, created by 6 Welcome to Python-RSA's documentation! 9 Python-RSA is a pure-Python RSA implementation. It supports 24 This RSA implementation has seen the eyes of a security expert, and it
|
/external/boringssl/src/crypto/x509/ |
D | x_all.c | 231 IMPLEMENT_D2I_FP(RSA, d2i_RSAPrivateKey_fp, d2i_RSAPrivateKey_bio) in IMPLEMENT_D2I_FP() argument 232 IMPLEMENT_I2D_FP(RSA, i2d_RSAPrivateKey_fp, i2d_RSAPrivateKey_bio) in IMPLEMENT_D2I_FP() 234 IMPLEMENT_D2I_FP(RSA, d2i_RSAPublicKey_fp, d2i_RSAPublicKey_bio) in IMPLEMENT_D2I_FP() 235 IMPLEMENT_I2D_FP(RSA, i2d_RSAPublicKey_fp, i2d_RSAPublicKey_bio) in IMPLEMENT_D2I_FP() 237 IMPLEMENT_D2I_FP(RSA, d2i_RSA_PUBKEY_fp, d2i_RSA_PUBKEY_bio) in IMPLEMENT_D2I_FP() 238 IMPLEMENT_I2D_FP(RSA, i2d_RSA_PUBKEY_fp, i2d_RSA_PUBKEY_bio) in IMPLEMENT_D2I_FP() 266 IMPLEMENT_D2I_BIO(RSA, d2i_RSAPrivateKey_bio, d2i_RSAPrivateKey) 267 IMPLEMENT_I2D_BIO(RSA, i2d_RSAPrivateKey_bio, i2d_RSAPrivateKey) 269 IMPLEMENT_D2I_BIO(RSA, d2i_RSAPublicKey_bio, d2i_RSAPublicKey) 270 IMPLEMENT_I2D_BIO(RSA, i2d_RSAPublicKey_bio, i2d_RSAPublicKey) [all …]
|
/external/python/cpython3/Lib/test/ |
D | badkey.pem | 1 -----BEGIN RSA PRIVATE KEY----- 3 -----END RSA PRIVATE KEY----- 21 -----BEGIN RSA PRIVATE KEY----- 23 -----END RSA PRIVATE KEY-----
|
D | badcert.pem | 1 -----BEGIN RSA PRIVATE KEY----- 15 -----END RSA PRIVATE KEY----- 19 -----BEGIN RSA PRIVATE KEY----- 33 -----END RSA PRIVATE KEY-----
|
/external/python/cpython2/Lib/test/ |
D | badkey.pem | 1 -----BEGIN RSA PRIVATE KEY----- 3 -----END RSA PRIVATE KEY----- 21 -----BEGIN RSA PRIVATE KEY----- 23 -----END RSA PRIVATE KEY-----
|
D | badcert.pem | 1 -----BEGIN RSA PRIVATE KEY----- 15 -----END RSA PRIVATE KEY----- 19 -----BEGIN RSA PRIVATE KEY----- 33 -----END RSA PRIVATE KEY-----
|
/external/boringssl/src/decrepit/rsa/ |
D | rsa_decrepit.c | 64 RSA *RSA_generate_key(int bits, unsigned long e_value, void *callback, in RSA_generate_key() 69 RSA *rsa = RSA_new(); in RSA_generate_key() 88 int RSA_padding_add_PKCS1_PSS(const RSA *rsa, uint8_t *EM, const uint8_t *mHash, in RSA_padding_add_PKCS1_PSS() 93 int RSA_verify_PKCS1_PSS(const RSA *rsa, const uint8_t *mHash, in RSA_verify_PKCS1_PSS()
|
/external/openssh/ |
D | rsa.h | 22 int rsa_public_encrypt(BIGNUM *, BIGNUM *, RSA *); 23 int rsa_private_decrypt(BIGNUM *, BIGNUM *, RSA *); 24 int rsa_generate_additional_parameters(RSA *);
|