Home
last modified time | relevance | path

Searched full:rsa (Results 1 – 25 of 207) sorted by relevance

123456789

/openbmc/qemu/crypto/
H A Dakcipher-nettle.c.inc22 #include <nettle/rsa.h>
42 QCryptoNettleRSA *rsa = (QCryptoNettleRSA *)akcipher;
43 if (!rsa) {
47 rsa_public_key_clear(&rsa->pub);
48 rsa_private_key_clear(&rsa->priv);
49 g_free(rsa);
65 return qcrypto_nettle_rsa_new(&opts->u.rsa, type, key, keylen, errp);
84 static int qcrypt_nettle_parse_rsa_private_key(QCryptoNettleRSA *rsa,
96 nettle_mpz_init_set_str_256_u(rsa->pub.n, rsa_key->n.len, rsa_key->n.data);
97 nettle_mpz_init_set_str_256_u(rsa->pub.e, rsa_key->e.len, rsa_key->e.data);
[all …]
H A Dakcipher-gcrypt.c.inc41 QCryptoGcryptRSA *rsa = (QCryptoGcryptRSA *)akcipher;
42 if (!rsa) {
46 gcry_sexp_release(rsa->key);
47 g_free(rsa);
64 &opts->u.rsa, type, key, keylen, errp);
84 QCryptoGcryptRSA *rsa,
101 error_setg(errp, "Failed to parse RSA parameter n: %s/%s",
109 error_setg(errp, "Failed to parse RSA parameter e: %s/%s",
117 error_setg(errp, "Failed to parse RSA parameter d: %s/%s",
125 error_setg(errp, "Failed to parse RSA parameter p: %s/%s",
[all …]
H A Drsakey-nettle.c.inc61 QCryptoAkCipherRSAKey *rsa = g_new0(QCryptoAkCipherRSAKey, 1);
73 !GetMPI(&i, &rsa->n) ||
74 !GetMPI(&i, &rsa->e) ||
75 !GetMPI(&i, &rsa->d) ||
76 !GetMPI(&i, &rsa->p) ||
77 !GetMPI(&i, &rsa->q) ||
78 !GetMPI(&i, &rsa->dp) ||
79 !GetMPI(&i, &rsa->dq) ||
80 !GetMPI(&i, &rsa->u)) {
93 return rsa;
[all …]
H A Drsakey-builtin.c.inc72 QCryptoAkCipherRSAKey *rsa = g_new0(QCryptoAkCipherRSAKey, 1);
85 &rsa->n, errp) < 0 ||
87 &rsa->e, errp) < 0) {
91 error_setg(errp, "Invalid RSA public key");
95 return rsa;
98 qcrypto_akcipher_rsakey_free(rsa);
119 QCryptoAkCipherRSAKey *rsa = g_new0(QCryptoAkCipherRSAKey, 1);
136 &rsa->n, errp) < 0 ||
138 &rsa->e, errp) < 0 ||
140 &rsa->d, errp) < 0 ||
[all …]
/openbmc/u-boot/lib/rsa/
H A DKconfig1 config RSA config
2 bool "Use RSA Library"
7 RSA support. This enables the RSA algorithm used for FIT image
10 The Modular Exponentiation algorithm in RSA is implemented using
17 if RSA
20 bool "Use RSA Library within SPL"
23 bool "Enable driver for RSA Modular Exponentiation in software"
26 Enables driver for modular exponentiation in software. This is a RSA
27 algorithm used in FIT image verification. It required RSA Key as
32 bool "Enable RSA Modular Exponentiation with FSL crypto accelerator"
[all …]
H A Drsa-sign.c12 #include <openssl/rsa.h>
25 static void RSA_get0_key(const RSA *r, in RSA_get0_key()
53 * @rsap Returns RSA object, or NULL on failure
56 static int rsa_pem_get_pub_key(const char *keydir, const char *name, RSA **rsap) in rsa_pem_get_pub_key()
61 RSA *rsa; in rsa_pem_get_pub_key() local
69 fprintf(stderr, "Couldn't open RSA certificate: '%s': %s\n", in rsa_pem_get_pub_key()
91 rsa = EVP_PKEY_get1_RSA(key); in rsa_pem_get_pub_key()
92 if (!rsa) { in rsa_pem_get_pub_key()
93 rsa_err("Couldn't convert to a RSA style key"); in rsa_pem_get_pub_key()
100 *rsap = rsa; in rsa_pem_get_pub_key()
[all …]
H A Drsa-verify.c20 #include <u-boot/rsa-mod-exp.h>
21 #include <u-boot/rsa.h>
27 * rsa_verify_padding() - Verify RSA message padding is valid
29 * Verify a RSA message's padding is consistent with PKCS1.5
30 * padding as described in the RSA PKCS#1 v2.1 standard.
95 * Generate an octet string used to check rsa signature.
274 * rsa_verify_key() - Verify a signature against some data using RSA Key
276 * Verify a RSA PKCS1.5 signature against an expected hash using
277 * the RSA Key properties in prop structure.
284 * @key_len: Number of bytes in rsa key
[all …]
H A DMakefile8 obj-$(CONFIG_$(SPL_)FIT_SIGNATURE) += rsa-verify.o rsa-checksum.o
9 obj-$(CONFIG_RSA_SOFTWARE_EXP) += rsa-mod-exp.o
H A Drsa-mod-exp.c19 #include <u-boot/rsa.h>
20 #include <u-boot/rsa-mod-exp.h>
75 * @key: RSA key
110 * @key: RSA key
129 * @key: RSA key
159 * @key: RSA key
171 * @key: RSA key
182 debug("RSA key words %u exceeds maximum %d\n", key->len, in pow_mod()
205 debug("LSB of RSA public exponent must be set.\n"); in pow_mod()
269 debug("%s: Missing RSA key info", __func__); in rsa_mod_exp_sw()
[all …]
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/pam/pam-ssh-agent-auth/
H A D0001-Adapt-to-OpenSSL-1.1.1.patch19 ssh-rsa.c | 22 +++++++--
31 pamsshagentauth_buffer_get_bignum(&auth->identities, key->rsa->e);
32 pamsshagentauth_buffer_get_bignum(&auth->identities, key->rsa->n);
37 BN_num_bits(key->rsa->n), bits);
39 + pamsshagentauth_buffer_get_bignum(&auth->identities, RSA_get0_e(key->rsa));
40 + pamsshagentauth_buffer_get_bignum(&auth->identities, RSA_get0_n(key->rsa));
42 + keybits = BN_num_bits(RSA_get0_n(key->rsa));
45 + BN_num_bits(RSA_get0_n(key->rsa)), bits);
55 pamsshagentauth_buffer_put_int(&buffer, BN_num_bits(key->rsa->n));
56 pamsshagentauth_buffer_put_bignum(&buffer, key->rsa->e);
[all …]
H A D0002-Check-against-the-correct-OPENSSL_VERSION_NUMBER.patch17 ssh-rsa.c | 4 ++--
30 pamsshagentauth_buffer_get_bignum(&auth->identities, key->rsa->e);
31 pamsshagentauth_buffer_get_bignum(&auth->identities, key->rsa->n);
39 pamsshagentauth_buffer_put_int(&buffer, BN_num_bits(key->rsa->n));
40 pamsshagentauth_buffer_put_bignum(&buffer, key->rsa->e);
41 pamsshagentauth_buffer_put_bignum(&buffer, key->rsa->n);
44 ssh_encode_identity_rsa1(Buffer *b, RSA *key, const char *comment)
57 pamsshagentauth_buffer_put_bignum2(b, key->rsa->n);
58 pamsshagentauth_buffer_put_bignum2(b, key->rsa->e);
59 pamsshagentauth_buffer_put_bignum2(b, key->rsa->d);
[all …]
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-devtools/android-tools/android-tools/core/
H A Dadb_libssl_11.diff3 fix that by accessing rsa->n (and e) directly, using RSA_get0_key instead.
18 @@ -75,6 +75,7 @@ static int RSA_to_RSAPublicKey(RSA *rsa,
25 if (RSA_size(rsa) != RSANUMBYTES) {
27 @@ -82,7 +83,7 @@ static int RSA_to_RSAPublicKey(RSA *rsa,
31 - BN_copy(n, rsa->n);
32 + RSA_get0_key(rsa, &n, &e, NULL);
36 @@ -96,11 +97,10 @@ static int RSA_to_RSAPublicKey(RSA *rsa,
40 - pkey->exponent = BN_get_word(rsa->e);
/openbmc/google-misc/subprojects/libcr51sign/src/
H A Dlibcr51sign_support.c23 #include <openssl/rsa.h>
140 // verify_signature expects RSA public key file path in ctx->key_ring
159 RSA *rsa = NULL, *pub_rsa = NULL; in verify_signature() local
175 rsa = EVP_PKEY_get1_RSA(pkey); in verify_signature()
176 if (!rsa) in verify_signature()
180 pub_rsa = RSAPublicKey_dup(rsa); in verify_signature()
183 CPRINTS(ctx, "RSA print failed\n"); in verify_signature()
187 CPRINTS(ctx, "no pub RSA\n"); in verify_signature()
190 CPRINTS(ctx, "public RSA\n"); in verify_signature()
243 CPRINTS(ctx, "rsa size %d sig_len %d\n", rsa_size, (uint32_t)sig_len); in verify_signature()
[all …]
/openbmc/qemu/tests/bench/
H A Dbenchmark-crypto-akcipher.c29 opt.u.rsa.padding_alg = padding; in create_rsa_akcipher()
30 opt.u.rsa.hash_alg = hash; in create_rsa_akcipher()
45 g_autoptr(QCryptoAkCipher) rsa = in test_rsa_speed()
55 g_test_message("benchmark rsa%zu (%s-%s) sign...", key_size, in test_rsa_speed()
60 g_assert(qcrypto_akcipher_sign(rsa, dgst, SHA1_DGST_LEN, in test_rsa_speed()
65 g_test_message("rsa%zu (%s-%s) sign %zu times in %.2f seconds," in test_rsa_speed()
72 g_test_message("benchmark rsa%zu (%s-%s) verification...", key_size, in test_rsa_speed()
77 g_assert(qcrypto_akcipher_verify(rsa, signature, key_size / BYTE, in test_rsa_speed()
82 g_test_message("rsa%zu (%s-%s) verify %zu times in %.2f seconds," in test_rsa_speed()
130 ADD_TEST(rsa, 1024); in main()
[all …]
/openbmc/u-boot/lib/libavb/
H A Davb_crypto.h19 /* Size of a RSA-2048 signature. */
22 /* Size of a RSA-4096 signature. */
25 /* Size of a RSA-8192 signature. */
51 * For signatures with RSA keys, PKCS v1.5 padding is used. The public
63 * signed with a 2048-bit RSA key. The field |hash_size| must be 32,
68 * a 4096-bit RSA key and |signature_size| set to 512.
71 * a 8192-bit RSA key and |signature_size| set to 1024.
75 * signed with a 2048-bit RSA key. The field |hash_size| must be 64,
80 * a 4096-bit RSA key and |signature_size| set to 512.
83 * a 8192-bit RSA key and |signature_size| set to 1024.
[all …]
/openbmc/u-boot/include/u-boot/
H A Drsa-mod-exp.h18 * as per requirement of RSA implementation.
30 * rsa_mod_exp_sw() - Perform RSA Modular Exponentiation in sw
34 * @sig: RSA PKCS1.5 signature
36 * @node: Node with RSA key elements like modulus, exponent, R^2, n0inv
50 * struct struct mod_exp_ops - Driver model for RSA Modular Exponentiation
62 * @dev: RSA Device
63 * @sig: RSA PKCS1.5 signature
65 * @node: Node with RSA key elements like modulus, exponent,
/openbmc/openbmc/poky/meta/files/common-licenses/
H A DRSA-MD1 Copyright (C) 1991-2, RSA Data Security, Inc. Created 1991. All rights reserved.
3 License to copy and use this software is granted provided that it is identified as the "RSA Data Se…
5 …ivative works provided that such works are identified as "derived from the RSA Data Security, Inc.…
7 RSA Data Security, Inc. makes no representations concerning either the merchantability of this soft…
/openbmc/openbmc/meta-openembedded/meta-perl/recipes-perl/libcrypt/
H A Dlibcrypt-openssl-rsa-perl_0.33.bb1 SUMMARY = "Crypt Openssl RSA cpan module"
3 HOMEPAGE = "https://metacpan.org/pod/Crypt::OpenSSL::RSA"
7 SRC_URI = "${CPAN_MIRROR}/authors/id/T/TO/TODDR/Crypt-OpenSSL-RSA-${PV}.tar.gz \
25 S = "${WORKDIR}/Crypt-OpenSSL-RSA-${PV}"
/openbmc/openbmc/meta-security/meta-tpm/recipes-tpm2/tpm2-tss-engine/files/
H A D0002-Fix-mismatch-of-OpenSSL-function-signatures-that-cau.patch10 src/tpm2-tss-engine-rsa.c:805:46: error: passing argument 2 of 'EVP_PKEY_meth_set_copy' from incomp…
29 src/tpm2-tss-engine-rsa.c | 4 ++--
54 diff --git a/src/tpm2-tss-engine-rsa.c b/src/tpm2-tss-engine-rsa.c
56 --- a/src/tpm2-tss-engine-rsa.c
57 +++ b/src/tpm2-tss-engine-rsa.c
/openbmc/u-boot/drivers/crypto/
H A DKconfig36 bool "ASPEED ECC/RSA Engine"
39 Select this option to enable a driver for using the ECC/RSA engine in
42 Enabling this allows the use of ECC/RSA operations in hardware without requiring the
/openbmc/openbmc/meta-phosphor/recipes-core/dropbear/dropbear/
H A Ddropbearkey.service5 # Set the default RSA key path then load environment variables from the
6 # environment file, which might override the default RSA key path.
13 @SBINDIR@/dropbearkey -t rsa -f ${DROPBEAR_RSAKEY_DIR}/dropbear_rsa_host_key; \
/openbmc/u-boot/doc/
H A DREADME.armada-secureboot29 * Load the header block of the boot image, extract a special "root" public RSA
32 * Load an array of code signing public RSA keys from the header block, and
33 verify its RSA signature (contained in the header block as well) using the
34 "root" RSA key.
67 CSK - Code Signing Key(s): An array of RSA key pairs, which
70 KAK - Key Authentication Key: A RSA key pair, which is used
128 of a RSA-2048 public key in DER format with a length of
130 Header block signature: The RSA signature of the header block (excluding the
132 Binary image signature: The RSA signature of the binary image, created using
134 CSK array: The array of the 16 CSKs as RSA-2048 public keys in DER
[all …]
/openbmc/u-boot/drivers/crypto/rsa_mod_exp/
H A DKconfig2 bool "Enable Driver Model for RSA Modular Exponentiation"
5 If you want to use driver model for RSA Modular Exponentiation, say Y.
/openbmc/u-boot/doc/uImage.FIT/
H A Dsignature.txt45 At present only one class of algorithms is supported: SHA1 hashing with RSA.
53 For this reason the RSA image verification uses pre-processed public keys
59 another RSA variant is needed, then it can be added to the table in
61 placed alongside rsa.c, and its functions added to the table in image-sig.c
65 Creating an RSA key pair and certificate
69 $ openssl genpkey -algorithm RSA -out keys/dev.key \
78 $ openssl rsa -in keys/dev.key -pubout
97 - value: The signature data (e.g. 256 bytes for 2048-bit RSA)
162 For RSA the following are mandatory:
164 - rsa,num-bits: Number of key bits (e.g. 2048)
[all …]
/openbmc/bmcweb/redfish-core/include/generated/enums/
H A Dkey.hpp12 RSA, enumerator
56 {SSHKeyType::RSA, "RSA"},

123456789