/openbmc/qemu/crypto/ |
H A D | akcipher-nettle.c.inc | 22 #include <nettle/rsa.h> 42 QCryptoNettleRSA *rsa = (QCryptoNettleRSA *)akcipher; 43 if (!rsa) { 47 rsa_public_key_clear(&rsa->pub); 48 rsa_private_key_clear(&rsa->priv); 49 g_free(rsa); 65 return qcrypto_nettle_rsa_new(&opts->u.rsa, type, key, keylen, errp); 84 static int qcrypt_nettle_parse_rsa_private_key(QCryptoNettleRSA *rsa, 96 nettle_mpz_init_set_str_256_u(rsa->pub.n, rsa_key->n.len, rsa_key->n.data); 97 nettle_mpz_init_set_str_256_u(rsa->pub.e, rsa_key->e.len, rsa_key->e.data); [all …]
|
H A D | akcipher-gcrypt.c.inc | 41 QCryptoGcryptRSA *rsa = (QCryptoGcryptRSA *)akcipher; 42 if (!rsa) { 46 gcry_sexp_release(rsa->key); 47 g_free(rsa); 64 &opts->u.rsa, type, key, keylen, errp); 84 QCryptoGcryptRSA *rsa, 101 error_setg(errp, "Failed to parse RSA parameter n: %s/%s", 109 error_setg(errp, "Failed to parse RSA parameter e: %s/%s", 117 error_setg(errp, "Failed to parse RSA parameter d: %s/%s", 125 error_setg(errp, "Failed to parse RSA parameter p: %s/%s", [all …]
|
H A D | rsakey-nettle.c.inc | 61 QCryptoAkCipherRSAKey *rsa = g_new0(QCryptoAkCipherRSAKey, 1); 73 !GetMPI(&i, &rsa->n) || 74 !GetMPI(&i, &rsa->e) || 75 !GetMPI(&i, &rsa->d) || 76 !GetMPI(&i, &rsa->p) || 77 !GetMPI(&i, &rsa->q) || 78 !GetMPI(&i, &rsa->dp) || 79 !GetMPI(&i, &rsa->dq) || 80 !GetMPI(&i, &rsa->u)) { 93 return rsa; [all …]
|
H A D | rsakey-builtin.c.inc | 72 QCryptoAkCipherRSAKey *rsa = g_new0(QCryptoAkCipherRSAKey, 1); 85 &rsa->n, errp) < 0 || 87 &rsa->e, errp) < 0) { 91 error_setg(errp, "Invalid RSA public key"); 95 return rsa; 98 qcrypto_akcipher_rsakey_free(rsa); 119 QCryptoAkCipherRSAKey *rsa = g_new0(QCryptoAkCipherRSAKey, 1); 136 &rsa->n, errp) < 0 || 138 &rsa->e, errp) < 0 || 140 &rsa->d, errp) < 0 || [all …]
|
/openbmc/u-boot/lib/rsa/ |
H A D | Kconfig | 1 config RSA config 2 bool "Use RSA Library" 7 RSA support. This enables the RSA algorithm used for FIT image 10 The Modular Exponentiation algorithm in RSA is implemented using 17 if RSA 20 bool "Use RSA Library within SPL" 23 bool "Enable driver for RSA Modular Exponentiation in software" 26 Enables driver for modular exponentiation in software. This is a RSA 27 algorithm used in FIT image verification. It required RSA Key as 32 bool "Enable RSA Modular Exponentiation with FSL crypto accelerator" [all …]
|
H A D | rsa-sign.c | 12 #include <openssl/rsa.h> 25 static void RSA_get0_key(const RSA *r, in RSA_get0_key() 53 * @rsap Returns RSA object, or NULL on failure 56 static int rsa_pem_get_pub_key(const char *keydir, const char *name, RSA **rsap) in rsa_pem_get_pub_key() 61 RSA *rsa; in rsa_pem_get_pub_key() local 69 fprintf(stderr, "Couldn't open RSA certificate: '%s': %s\n", in rsa_pem_get_pub_key() 91 rsa = EVP_PKEY_get1_RSA(key); in rsa_pem_get_pub_key() 92 if (!rsa) { in rsa_pem_get_pub_key() 93 rsa_err("Couldn't convert to a RSA style key"); in rsa_pem_get_pub_key() 100 *rsap = rsa; in rsa_pem_get_pub_key() [all …]
|
H A D | rsa-verify.c | 20 #include <u-boot/rsa-mod-exp.h> 21 #include <u-boot/rsa.h> 27 * rsa_verify_padding() - Verify RSA message padding is valid 29 * Verify a RSA message's padding is consistent with PKCS1.5 30 * padding as described in the RSA PKCS#1 v2.1 standard. 95 * Generate an octet string used to check rsa signature. 274 * rsa_verify_key() - Verify a signature against some data using RSA Key 276 * Verify a RSA PKCS1.5 signature against an expected hash using 277 * the RSA Key properties in prop structure. 284 * @key_len: Number of bytes in rsa key [all …]
|
H A D | Makefile | 8 obj-$(CONFIG_$(SPL_)FIT_SIGNATURE) += rsa-verify.o rsa-checksum.o 9 obj-$(CONFIG_RSA_SOFTWARE_EXP) += rsa-mod-exp.o
|
H A D | rsa-mod-exp.c | 19 #include <u-boot/rsa.h> 20 #include <u-boot/rsa-mod-exp.h> 75 * @key: RSA key 110 * @key: RSA key 129 * @key: RSA key 159 * @key: RSA key 171 * @key: RSA key 182 debug("RSA key words %u exceeds maximum %d\n", key->len, in pow_mod() 205 debug("LSB of RSA public exponent must be set.\n"); in pow_mod() 269 debug("%s: Missing RSA key info", __func__); in rsa_mod_exp_sw() [all …]
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/pam/pam-ssh-agent-auth/ |
H A D | 0001-Adapt-to-OpenSSL-1.1.1.patch | 19 ssh-rsa.c | 22 +++++++-- 31 pamsshagentauth_buffer_get_bignum(&auth->identities, key->rsa->e); 32 pamsshagentauth_buffer_get_bignum(&auth->identities, key->rsa->n); 37 BN_num_bits(key->rsa->n), bits); 39 + pamsshagentauth_buffer_get_bignum(&auth->identities, RSA_get0_e(key->rsa)); 40 + pamsshagentauth_buffer_get_bignum(&auth->identities, RSA_get0_n(key->rsa)); 42 + keybits = BN_num_bits(RSA_get0_n(key->rsa)); 45 + BN_num_bits(RSA_get0_n(key->rsa)), bits); 55 pamsshagentauth_buffer_put_int(&buffer, BN_num_bits(key->rsa->n)); 56 pamsshagentauth_buffer_put_bignum(&buffer, key->rsa->e); [all …]
|
H A D | 0002-Check-against-the-correct-OPENSSL_VERSION_NUMBER.patch | 17 ssh-rsa.c | 4 ++-- 30 pamsshagentauth_buffer_get_bignum(&auth->identities, key->rsa->e); 31 pamsshagentauth_buffer_get_bignum(&auth->identities, key->rsa->n); 39 pamsshagentauth_buffer_put_int(&buffer, BN_num_bits(key->rsa->n)); 40 pamsshagentauth_buffer_put_bignum(&buffer, key->rsa->e); 41 pamsshagentauth_buffer_put_bignum(&buffer, key->rsa->n); 44 ssh_encode_identity_rsa1(Buffer *b, RSA *key, const char *comment) 57 pamsshagentauth_buffer_put_bignum2(b, key->rsa->n); 58 pamsshagentauth_buffer_put_bignum2(b, key->rsa->e); 59 pamsshagentauth_buffer_put_bignum2(b, key->rsa->d); [all …]
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-devtools/android-tools/android-tools/core/ |
H A D | adb_libssl_11.diff | 3 fix that by accessing rsa->n (and e) directly, using RSA_get0_key instead. 18 @@ -75,6 +75,7 @@ static int RSA_to_RSAPublicKey(RSA *rsa, 25 if (RSA_size(rsa) != RSANUMBYTES) { 27 @@ -82,7 +83,7 @@ static int RSA_to_RSAPublicKey(RSA *rsa, 31 - BN_copy(n, rsa->n); 32 + RSA_get0_key(rsa, &n, &e, NULL); 36 @@ -96,11 +97,10 @@ static int RSA_to_RSAPublicKey(RSA *rsa, 40 - pkey->exponent = BN_get_word(rsa->e);
|
/openbmc/google-misc/subprojects/libcr51sign/src/ |
H A D | libcr51sign_support.c | 23 #include <openssl/rsa.h> 140 // verify_signature expects RSA public key file path in ctx->key_ring 159 RSA *rsa = NULL, *pub_rsa = NULL; in verify_signature() local 175 rsa = EVP_PKEY_get1_RSA(pkey); in verify_signature() 176 if (!rsa) in verify_signature() 180 pub_rsa = RSAPublicKey_dup(rsa); in verify_signature() 183 CPRINTS(ctx, "RSA print failed\n"); in verify_signature() 187 CPRINTS(ctx, "no pub RSA\n"); in verify_signature() 190 CPRINTS(ctx, "public RSA\n"); in verify_signature() 243 CPRINTS(ctx, "rsa size %d sig_len %d\n", rsa_size, (uint32_t)sig_len); in verify_signature() [all …]
|
/openbmc/qemu/tests/bench/ |
H A D | benchmark-crypto-akcipher.c | 29 opt.u.rsa.padding_alg = padding; in create_rsa_akcipher() 30 opt.u.rsa.hash_alg = hash; in create_rsa_akcipher() 45 g_autoptr(QCryptoAkCipher) rsa = in test_rsa_speed() 55 g_test_message("benchmark rsa%zu (%s-%s) sign...", key_size, in test_rsa_speed() 60 g_assert(qcrypto_akcipher_sign(rsa, dgst, SHA1_DGST_LEN, in test_rsa_speed() 65 g_test_message("rsa%zu (%s-%s) sign %zu times in %.2f seconds," in test_rsa_speed() 72 g_test_message("benchmark rsa%zu (%s-%s) verification...", key_size, in test_rsa_speed() 77 g_assert(qcrypto_akcipher_verify(rsa, signature, key_size / BYTE, in test_rsa_speed() 82 g_test_message("rsa%zu (%s-%s) verify %zu times in %.2f seconds," in test_rsa_speed() 130 ADD_TEST(rsa, 1024); in main() [all …]
|
/openbmc/u-boot/lib/libavb/ |
H A D | avb_crypto.h | 19 /* Size of a RSA-2048 signature. */ 22 /* Size of a RSA-4096 signature. */ 25 /* Size of a RSA-8192 signature. */ 51 * For signatures with RSA keys, PKCS v1.5 padding is used. The public 63 * signed with a 2048-bit RSA key. The field |hash_size| must be 32, 68 * a 4096-bit RSA key and |signature_size| set to 512. 71 * a 8192-bit RSA key and |signature_size| set to 1024. 75 * signed with a 2048-bit RSA key. The field |hash_size| must be 64, 80 * a 4096-bit RSA key and |signature_size| set to 512. 83 * a 8192-bit RSA key and |signature_size| set to 1024. [all …]
|
/openbmc/u-boot/include/u-boot/ |
H A D | rsa-mod-exp.h | 18 * as per requirement of RSA implementation. 30 * rsa_mod_exp_sw() - Perform RSA Modular Exponentiation in sw 34 * @sig: RSA PKCS1.5 signature 36 * @node: Node with RSA key elements like modulus, exponent, R^2, n0inv 50 * struct struct mod_exp_ops - Driver model for RSA Modular Exponentiation 62 * @dev: RSA Device 63 * @sig: RSA PKCS1.5 signature 65 * @node: Node with RSA key elements like modulus, exponent,
|
/openbmc/openbmc/poky/meta/files/common-licenses/ |
H A D | RSA-MD | 1 Copyright (C) 1991-2, RSA Data Security, Inc. Created 1991. All rights reserved. 3 License to copy and use this software is granted provided that it is identified as the "RSA Data Se… 5 …ivative works provided that such works are identified as "derived from the RSA Data Security, Inc.… 7 RSA Data Security, Inc. makes no representations concerning either the merchantability of this soft…
|
/openbmc/openbmc/meta-openembedded/meta-perl/recipes-perl/libcrypt/ |
H A D | libcrypt-openssl-rsa-perl_0.33.bb | 1 SUMMARY = "Crypt Openssl RSA cpan module" 3 HOMEPAGE = "https://metacpan.org/pod/Crypt::OpenSSL::RSA" 7 SRC_URI = "${CPAN_MIRROR}/authors/id/T/TO/TODDR/Crypt-OpenSSL-RSA-${PV}.tar.gz \ 25 S = "${WORKDIR}/Crypt-OpenSSL-RSA-${PV}"
|
/openbmc/openbmc/meta-security/meta-tpm/recipes-tpm2/tpm2-tss-engine/files/ |
H A D | 0002-Fix-mismatch-of-OpenSSL-function-signatures-that-cau.patch | 10 src/tpm2-tss-engine-rsa.c:805:46: error: passing argument 2 of 'EVP_PKEY_meth_set_copy' from incomp… 29 src/tpm2-tss-engine-rsa.c | 4 ++-- 54 diff --git a/src/tpm2-tss-engine-rsa.c b/src/tpm2-tss-engine-rsa.c 56 --- a/src/tpm2-tss-engine-rsa.c 57 +++ b/src/tpm2-tss-engine-rsa.c
|
/openbmc/u-boot/drivers/crypto/ |
H A D | Kconfig | 36 bool "ASPEED ECC/RSA Engine" 39 Select this option to enable a driver for using the ECC/RSA engine in 42 Enabling this allows the use of ECC/RSA operations in hardware without requiring the
|
/openbmc/openbmc/meta-phosphor/recipes-core/dropbear/dropbear/ |
H A D | dropbearkey.service | 5 # Set the default RSA key path then load environment variables from the 6 # environment file, which might override the default RSA key path. 13 @SBINDIR@/dropbearkey -t rsa -f ${DROPBEAR_RSAKEY_DIR}/dropbear_rsa_host_key; \
|
/openbmc/u-boot/doc/ |
H A D | README.armada-secureboot | 29 * Load the header block of the boot image, extract a special "root" public RSA 32 * Load an array of code signing public RSA keys from the header block, and 33 verify its RSA signature (contained in the header block as well) using the 34 "root" RSA key. 67 CSK - Code Signing Key(s): An array of RSA key pairs, which 70 KAK - Key Authentication Key: A RSA key pair, which is used 128 of a RSA-2048 public key in DER format with a length of 130 Header block signature: The RSA signature of the header block (excluding the 132 Binary image signature: The RSA signature of the binary image, created using 134 CSK array: The array of the 16 CSKs as RSA-2048 public keys in DER [all …]
|
/openbmc/u-boot/drivers/crypto/rsa_mod_exp/ |
H A D | Kconfig | 2 bool "Enable Driver Model for RSA Modular Exponentiation" 5 If you want to use driver model for RSA Modular Exponentiation, say Y.
|
/openbmc/u-boot/doc/uImage.FIT/ |
H A D | signature.txt | 45 At present only one class of algorithms is supported: SHA1 hashing with RSA. 53 For this reason the RSA image verification uses pre-processed public keys 59 another RSA variant is needed, then it can be added to the table in 61 placed alongside rsa.c, and its functions added to the table in image-sig.c 65 Creating an RSA key pair and certificate 69 $ openssl genpkey -algorithm RSA -out keys/dev.key \ 78 $ openssl rsa -in keys/dev.key -pubout 97 - value: The signature data (e.g. 256 bytes for 2048-bit RSA) 162 For RSA the following are mandatory: 164 - rsa,num-bits: Number of key bits (e.g. 2048) [all …]
|
/openbmc/bmcweb/redfish-core/include/generated/enums/ |
H A D | key.hpp | 12 RSA, enumerator 56 {SSHKeyType::RSA, "RSA"},
|