Home
last modified time | relevance | path

Searched refs:RSA (Results 1 – 25 of 94) sorted by relevance

1234

/openbmc/u-boot/lib/rsa/
H A DKconfig1 config RSA config
2 bool "Use RSA Library"
7 RSA support. This enables the RSA algorithm used for FIT image
10 The Modular Exponentiation algorithm in RSA is implemented using
17 if RSA
20 bool "Use RSA Library within SPL"
23 bool "Enable driver for RSA Modular Exponentiation in software"
26 Enables driver for modular exponentiation in software. This is a RSA
27 algorithm used in FIT image verification. It required RSA Key as
32 bool "Enable RSA Modular Exponentiation with FSL crypto accelerator"
[all …]
H A Drsa-sign.c25 static void RSA_get0_key(const RSA *r, in RSA_get0_key()
61 RSA *rsa; in rsa_pem_get_pub_key()
123 ENGINE *engine, RSA **rsap) in rsa_engine_get_pub_key()
128 RSA *rsa; in rsa_engine_get_pub_key()
181 ENGINE *engine, RSA **rsap) in rsa_get_pub_key()
197 RSA **rsap) in rsa_pem_get_priv_key()
200 RSA *rsa; in rsa_pem_get_priv_key()
234 ENGINE *engine, RSA **rsap) in rsa_engine_get_priv_key()
239 RSA *rsa; in rsa_engine_get_priv_key()
493 RSA *rsa; in rsa_sign()
[all …]
/openbmc/linux/Documentation/devicetree/bindings/crypto/
H A Daspeed,ast2600-acry.yaml7 title: ASPEED ACRY ECDSA/RSA Hardware Accelerator Engines
13 The ACRY ECDSA/RSA engines is designed to accelerate the throughput
14 of ECDSA/RSA signature and verification. Basically, ACRY can be
15 divided into two independent engines - ECC Engine and RSA Engine.
/openbmc/openbmc/poky/meta/files/common-licenses/
H A DRSA-MD1 Copyright (C) 1991-2, RSA Data Security, Inc. Created 1991. All rights reserved.
3 License to copy and use this software is granted provided that it is identified as the "RSA Data Se…
5 …ivative works provided that such works are identified as "derived from the RSA Data Security, Inc.…
7 RSA Data Security, Inc. makes no representations concerning either the merchantability of this soft…
/openbmc/openbmc/meta-openembedded/meta-perl/recipes-perl/libcrypt/
H A Dlibcrypt-openssl-rsa-perl_0.33.bb1 SUMMARY = "Crypt Openssl RSA cpan module"
6 SRC_URI = "http://www.cpan.org/modules/by-module/Crypt/Crypt-OpenSSL-RSA-${PV}.tar.gz \
24 S = "${WORKDIR}/Crypt-OpenSSL-RSA-${PV}"
/openbmc/linux/drivers/crypto/aspeed/
H A DKconfig51 bool "Enable Aspeed ACRY RSA Engine"
56 Select here to enable Aspeed ECC/RSA Engine (ACRY)
57 RSA driver.
58 Supports 256 bits to 4096 bits RSA encryption/decryption
/openbmc/u-boot/drivers/crypto/rsa_mod_exp/
H A DKconfig2 bool "Enable Driver Model for RSA Modular Exponentiation"
5 If you want to use driver model for RSA Modular Exponentiation, say Y.
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-devtools/android-tools/android-tools/core/
H A Dadb_libssl_11.diff18 @@ -75,6 +75,7 @@ static int RSA_to_RSAPublicKey(RSA *rsa,
26 @@ -82,7 +83,7 @@ static int RSA_to_RSAPublicKey(RSA *rsa,
35 @@ -96,7 +97,7 @@ static int RSA_to_RSAPublicKey(RSA *rsa,
/openbmc/u-boot/tools/
H A Dkwbimage.c28 static void RSA_get0_key(const RSA *r, in RSA_get0_key()
392 RSA *rsa; in kwb_load_rsa_key()
420 RSA **p_key) in kwb_load_cfg_key()
423 RSA *key; in kwb_load_cfg_key()
497 RSA *rsa; in kwb_import_pubkey()
663 int kwb_verify(RSA *key, void *data, int datasz, struct sig_v1 *sig, in kwb_verify()
1107 int export_pub_kak_hash(RSA *kak, struct secure_hdr_v1 *secure_hdr) in export_pub_kak_hash()
1122 struct secure_hdr_v1 *secure_hdr, RSA *csk) in kwb_sign_csk_with_kak()
1124 RSA *kak = NULL; in kwb_sign_csk_with_kak()
1125 RSA *kak_pub = NULL; in kwb_sign_csk_with_kak()
[all …]
/openbmc/u-boot/drivers/crypto/
H A DKconfig36 bool "ASPEED ECC/RSA Engine"
39 Select this option to enable a driver for using the ECC/RSA engine in
42 Enabling this allows the use of ECC/RSA operations in hardware without requiring the
/openbmc/qemu/tests/keys/
H A Did_rsa1 -----BEGIN RSA PRIVATE KEY-----
27 -----END RSA PRIVATE KEY-----
H A Dvagrant1 -----BEGIN RSA PRIVATE KEY-----
27 -----END RSA PRIVATE KEY-----
/openbmc/u-boot/doc/
H A DREADME.armada-secureboot29 * Load the header block of the boot image, extract a special "root" public RSA
32 * Load an array of code signing public RSA keys from the header block, and
33 verify its RSA signature (contained in the header block as well) using the
34 "root" RSA key.
67 CSK - Code Signing Key(s): An array of RSA key pairs, which
70 KAK - Key Authentication Key: A RSA key pair, which is used
128 of a RSA-2048 public key in DER format with a length of
158 8) Verify the binary image's RSA signature from the secured header with the
210 KAK - The name of the KAK RSA private key file in the U-Boot
212 CSK - The name of the (active) CSK RSA private key file in the
[all …]
H A DREADME.esbc_validate11 SHA-256 and RSA operations are performed using SEC block in HW.
17 Validates signature using RSA verification.
/openbmc/linux/tools/testing/selftests/sgx/
H A Dsign_key.pem1 -----BEGIN RSA PRIVATE KEY-----
39 -----END RSA PRIVATE KEY-----
H A Dsigstruct.c153 static inline const BIGNUM *get_modulus(RSA *key) in get_modulus()
161 static RSA *gen_sign_key(void) in gen_sign_key()
165 RSA *key; in gen_sign_key()
323 RSA *key = NULL; in encl_measure()
/openbmc/bmcweb/redfish-core/include/generated/enums/
H A Dkey.hpp10 RSA, enumerator
54 {SSHKeyType::RSA, "RSA"},
/openbmc/openbmc/meta-phosphor/recipes-core/dropbear/dropbear/
H A Ddropbearkey.service5 # Set the default RSA key path then load environment variables from the
6 # environment file, which might override the default RSA key path.
/openbmc/phosphor-rest-server/servers/gevent/
H A Dcert.pem20 -----BEGIN RSA PRIVATE KEY-----
46 -----END RSA PRIVATE KEY-----
/openbmc/phosphor-rest-server/servers/rocket/
H A Dcert.pem20 -----BEGIN RSA PRIVATE KEY-----
46 -----END RSA PRIVATE KEY-----
/openbmc/phosphor-rest-server/servers/
H A Dcert.pem20 -----BEGIN RSA PRIVATE KEY-----
46 -----END RSA PRIVATE KEY-----
/openbmc/qemu/crypto/
H A Dakcipher-gcrypt.c.inc101 error_setg(errp, "Failed to parse RSA parameter n: %s/%s",
109 error_setg(errp, "Failed to parse RSA parameter e: %s/%s",
117 error_setg(errp, "Failed to parse RSA parameter d: %s/%s",
125 error_setg(errp, "Failed to parse RSA parameter p: %s/%s",
133 error_setg(errp, "Failed to parse RSA parameter q: %s/%s",
157 error_setg(errp, "Failed to build RSA private key: %s/%s",
193 error_setg(errp, "Failed to parse RSA parameter n: %s/%s",
201 error_setg(errp, "Failed to parse RSA parameter e: %s/%s",
209 error_setg(errp, "Failed to build RSA public key: %s/%s",
285 /* We always padding leading-zeros for RSA-RAW */
[all …]
H A Dakcipher-nettle.c.inc108 error_setg(errp, "Failed to check RSA key");
122 error_setg(errp, "Failed to check RSA key");
149 error_setg(errp, "Failed to check RSA key");
185 /* Nettle do not support RSA encryption without any padding */
188 error_setg(errp, "RSA with raw padding is not supported");
227 error_setg(errp, "RSA with raw padding is not supported");
257 * The RSA algorithm cannot be used for signature/verification
324 * The RSA algorithm cannot be used for signature/verification
/openbmc/openbmc/meta-aspeed/recipes-bsp/u-boot/files/
H A Drsa_oem_dss_key.pem9 -----BEGIN RSA PRIVATE KEY-----
59 -----END RSA PRIVATE KEY-----
/openbmc/qemu/tests/qemu-iotests/
H A Dcommon.tls66 -----BEGIN RSA PRIVATE KEY-----
104 -----END RSA PRIVATE KEY-----

1234