Home
last modified time | relevance | path

Searched refs:rsa (Results 1 – 25 of 94) sorted by relevance

1234

/openbmc/linux/drivers/crypto/ccp/
H A Dccp-crypto-rsa.c52 req->dst_len = rctx->cmd.u.rsa.key_size >> 3; in ccp_rsa_complete()
61 return ctx->u.rsa.n_len; in ccp_rsa_maxsize()
75 rctx->cmd.u.rsa.key_size = ctx->u.rsa.key_len; /* in bits */ in ccp_rsa_crypt()
77 rctx->cmd.u.rsa.exp = &ctx->u.rsa.e_sg; in ccp_rsa_crypt()
78 rctx->cmd.u.rsa.exp_len = ctx->u.rsa.e_len; in ccp_rsa_crypt()
80 rctx->cmd.u.rsa.exp = &ctx->u.rsa.d_sg; in ccp_rsa_crypt()
81 rctx->cmd.u.rsa.exp_len = ctx->u.rsa.d_len; in ccp_rsa_crypt()
83 rctx->cmd.u.rsa.mod = &ctx->u.rsa.n_sg; in ccp_rsa_crypt()
84 rctx->cmd.u.rsa.mod_len = ctx->u.rsa.n_len; in ccp_rsa_crypt()
85 rctx->cmd.u.rsa.src = req->src; in ccp_rsa_crypt()
[all …]
/openbmc/qemu/crypto/
H A Dakcipher-nettle.c.inc22 #include <nettle/rsa.h>
42 QCryptoNettleRSA *rsa = (QCryptoNettleRSA *)akcipher;
43 if (!rsa) {
47 rsa_public_key_clear(&rsa->pub);
48 rsa_private_key_clear(&rsa->priv);
49 g_free(rsa);
65 return qcrypto_nettle_rsa_new(&opts->u.rsa, type, key, keylen, errp);
84 static int qcrypt_nettle_parse_rsa_private_key(QCryptoNettleRSA *rsa,
96 nettle_mpz_init_set_str_256_u(rsa->pub.n, rsa_key->n.len, rsa_key->n.data);
97 nettle_mpz_init_set_str_256_u(rsa->pub.e, rsa_key->e.len, rsa_key->e.data);
[all …]
H A Dakcipher-gcrypt.c.inc41 QCryptoGcryptRSA *rsa = (QCryptoGcryptRSA *)akcipher;
42 if (!rsa) {
46 gcry_sexp_release(rsa->key);
47 g_free(rsa);
64 &opts->u.rsa, type, key, keylen, errp);
84 QCryptoGcryptRSA *rsa,
149 err = gcry_sexp_build(&rsa->key, NULL,
150 "(private-key (rsa (n %m) (e %m) (d %m) (p %m) (q %m) (u %m)))",
153 err = gcry_sexp_build(&rsa->key, NULL,
154 "(private-key (rsa (n %m) (e %m) (d %m)))", n, e, d);
[all …]
H A Drsakey-nettle.c.inc61 QCryptoAkCipherRSAKey *rsa = g_new0(QCryptoAkCipherRSAKey, 1);
73 !GetMPI(&i, &rsa->n) ||
74 !GetMPI(&i, &rsa->e) ||
75 !GetMPI(&i, &rsa->d) ||
76 !GetMPI(&i, &rsa->p) ||
77 !GetMPI(&i, &rsa->q) ||
78 !GetMPI(&i, &rsa->dp) ||
79 !GetMPI(&i, &rsa->dq) ||
80 !GetMPI(&i, &rsa->u)) {
93 return rsa;
[all …]
H A Drsakey-builtin.c.inc72 QCryptoAkCipherRSAKey *rsa = g_new0(QCryptoAkCipherRSAKey, 1);
85 &rsa->n, errp) < 0 ||
87 &rsa->e, errp) < 0) {
95 return rsa;
98 qcrypto_akcipher_rsakey_free(rsa);
119 QCryptoAkCipherRSAKey *rsa = g_new0(QCryptoAkCipherRSAKey, 1);
136 &rsa->n, errp) < 0 ||
138 &rsa->e, errp) < 0 ||
140 &rsa->d, errp) < 0 ||
141 qcrypto_der_decode_int(&seq, &seq_length, extract_mpi, &rsa->p,
[all …]
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/pam/pam-ssh-agent-auth/
H A D0001-Adapt-to-OpenSSL-1.1.1.patch19 ssh-rsa.c | 22 +++++++--
31 pamsshagentauth_buffer_get_bignum(&auth->identities, key->rsa->e);
32 pamsshagentauth_buffer_get_bignum(&auth->identities, key->rsa->n);
37 BN_num_bits(key->rsa->n), bits);
39 + pamsshagentauth_buffer_get_bignum(&auth->identities, RSA_get0_e(key->rsa));
40 + pamsshagentauth_buffer_get_bignum(&auth->identities, RSA_get0_n(key->rsa));
42 + keybits = BN_num_bits(RSA_get0_n(key->rsa));
45 + BN_num_bits(RSA_get0_n(key->rsa)), bits);
55 pamsshagentauth_buffer_put_int(&buffer, BN_num_bits(key->rsa->n));
56 pamsshagentauth_buffer_put_bignum(&buffer, key->rsa->e);
[all …]
H A D0002-Check-against-the-correct-OPENSSL_VERSION_NUMBER.patch17 ssh-rsa.c | 4 ++--
30 pamsshagentauth_buffer_get_bignum(&auth->identities, key->rsa->e);
31 pamsshagentauth_buffer_get_bignum(&auth->identities, key->rsa->n);
39 pamsshagentauth_buffer_put_int(&buffer, BN_num_bits(key->rsa->n));
40 pamsshagentauth_buffer_put_bignum(&buffer, key->rsa->e);
41 pamsshagentauth_buffer_put_bignum(&buffer, key->rsa->n);
57 pamsshagentauth_buffer_put_bignum2(b, key->rsa->n);
58 pamsshagentauth_buffer_put_bignum2(b, key->rsa->e);
59 pamsshagentauth_buffer_put_bignum2(b, key->rsa->d);
75 pamsshagentauth_buffer_put_int(&msg, BN_num_bits(key->rsa->n));
[all …]
/openbmc/linux/drivers/net/ethernet/intel/ixgbe/
H A Dixgbe_ipsec.c396 struct rx_sa *rsa; in ixgbe_ipsec_find_rx_state() local
400 hash_for_each_possible_rcu(ipsec->rx_sa_list, rsa, hlist, in ixgbe_ipsec_find_rx_state()
402 if (rsa->mode & IXGBE_RXTXMOD_VF) in ixgbe_ipsec_find_rx_state()
404 if (spi == rsa->xs->id.spi && in ixgbe_ipsec_find_rx_state()
405 ((ip4 && *daddr == rsa->xs->id.daddr.a4) || in ixgbe_ipsec_find_rx_state()
406 (!ip4 && !memcmp(daddr, &rsa->xs->id.daddr.a6, in ixgbe_ipsec_find_rx_state()
407 sizeof(rsa->xs->id.daddr.a6)))) && in ixgbe_ipsec_find_rx_state()
408 proto == rsa->xs->id.proto) { in ixgbe_ipsec_find_rx_state()
409 ret = rsa->xs; in ixgbe_ipsec_find_rx_state()
595 struct rx_sa rsa; in ixgbe_ipsec_add_sa() local
[all …]
/openbmc/linux/drivers/net/ethernet/intel/ixgbevf/
H A Dipsec.c183 struct rx_sa *rsa; in ixgbevf_ipsec_find_rx_state() local
186 hash_for_each_possible_rcu(ipsec->rx_sa_list, rsa, hlist, in ixgbevf_ipsec_find_rx_state()
188 if (spi == rsa->xs->id.spi && in ixgbevf_ipsec_find_rx_state()
189 ((ip4 && *daddr == rsa->xs->id.daddr.a4) || in ixgbevf_ipsec_find_rx_state()
190 (!ip4 && !memcmp(daddr, &rsa->xs->id.daddr.a6, in ixgbevf_ipsec_find_rx_state()
191 sizeof(rsa->xs->id.daddr.a6)))) && in ixgbevf_ipsec_find_rx_state()
192 proto == rsa->xs->id.proto) { in ixgbevf_ipsec_find_rx_state()
193 ret = rsa->xs; in ixgbevf_ipsec_find_rx_state()
290 struct rx_sa rsa; in ixgbevf_ipsec_add_sa() local
305 memset(&rsa, 0, sizeof(rsa)); in ixgbevf_ipsec_add_sa()
[all …]
/openbmc/u-boot/lib/rsa/
H A Drsa-sign.c61 RSA *rsa; in rsa_pem_get_pub_key() local
91 rsa = EVP_PKEY_get1_RSA(key); in rsa_pem_get_pub_key()
92 if (!rsa) { in rsa_pem_get_pub_key()
100 *rsap = rsa; in rsa_pem_get_pub_key()
128 RSA *rsa; in rsa_engine_get_pub_key() local
154 rsa = EVP_PKEY_get1_RSA(key); in rsa_engine_get_pub_key()
155 if (!rsa) { in rsa_engine_get_pub_key()
162 *rsap = rsa; in rsa_engine_get_pub_key()
200 RSA *rsa; in rsa_pem_get_priv_key() local
212 rsa = PEM_read_RSAPrivateKey(f, 0, NULL, path); in rsa_pem_get_priv_key()
[all …]
H A DMakefile8 obj-$(CONFIG_$(SPL_)FIT_SIGNATURE) += rsa-verify.o rsa-checksum.o
9 obj-$(CONFIG_RSA_SOFTWARE_EXP) += rsa-mod-exp.o
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-devtools/android-tools/android-tools/core/
H A Dadb_libssl_11.diff3 fix that by accessing rsa->n (and e) directly, using RSA_get0_key instead.
18 @@ -75,6 +75,7 @@ static int RSA_to_RSAPublicKey(RSA *rsa,
25 if (RSA_size(rsa) != RSANUMBYTES) {
27 @@ -82,7 +83,7 @@ static int RSA_to_RSAPublicKey(RSA *rsa,
31 - BN_copy(n, rsa->n);
32 + RSA_get0_key(rsa, &n, &e, NULL);
36 @@ -96,11 +97,10 @@ static int RSA_to_RSAPublicKey(RSA *rsa,
40 - pkey->exponent = BN_get_word(rsa->e);
/openbmc/linux/drivers/crypto/intel/qat/qat_common/
H A Dqat_asym_algs.c117 struct qat_rsa_input_params rsa; member
121 struct qat_rsa_output_params rsa; member
130 struct qat_rsa_ctx *rsa; member
134 struct akcipher_request *rsa; member
516 struct akcipher_request *areq = req->areq.rsa; in qat_rsa_cb()
517 struct device *dev = &GET_DEV(req->ctx.rsa->inst->accel_dev); in qat_rsa_cb()
523 dma_unmap_single(dev, req->in.rsa.enc.m, req->ctx.rsa->key_sz, in qat_rsa_cb()
528 areq->dst_len = req->ctx.rsa->key_sz; in qat_rsa_cb()
529 dma_unmap_single(dev, req->out.rsa.enc.c, req->ctx.rsa->key_sz, in qat_rsa_cb()
677 qat_req->ctx.rsa = ctx; in qat_rsa_enc()
[all …]
/openbmc/qemu/tests/bench/
H A Dbenchmark-crypto-akcipher.c29 opt.u.rsa.padding_alg = padding; in create_rsa_akcipher()
30 opt.u.rsa.hash_alg = hash; in create_rsa_akcipher()
45 g_autoptr(QCryptoAkCipher) rsa = in test_rsa_speed()
60 g_assert(qcrypto_akcipher_sign(rsa, dgst, SHA1_DGST_LEN, in test_rsa_speed()
77 g_assert(qcrypto_akcipher_verify(rsa, signature, key_size / BYTE, in test_rsa_speed()
130 ADD_TEST(rsa, 1024); in main()
131 ADD_TEST(rsa, 2048); in main()
132 ADD_TEST(rsa, 4096); in main()
/openbmc/linux/drivers/crypto/hisilicon/hpre/
H A Dhpre_crypto.c124 struct hpre_rsa_ctx rsa; member
139 struct akcipher_request *rsa; member
467 areq = req->areq.rsa; in hpre_rsa_cb()
532 h_req->areq.rsa = akreq; in hpre_msg_request_set()
805 akcipher_request_set_tfm(req, ctx->rsa.soft_tfm); in hpre_rsa_enc()
811 if (unlikely(!ctx->rsa.pubkey)) in hpre_rsa_enc()
819 msg->key = cpu_to_le64(ctx->rsa.dma_pubkey); in hpre_rsa_enc()
853 akcipher_request_set_tfm(req, ctx->rsa.soft_tfm); in hpre_rsa_dec()
859 if (unlikely(!ctx->rsa.prikey)) in hpre_rsa_dec()
867 msg->key = cpu_to_le64(ctx->rsa.dma_crt_prikey); in hpre_rsa_dec()
[all …]
/openbmc/openbmc/meta-security/meta-tpm/recipes-tpm2/tpm2-tss-engine/files/
H A D0002-Fix-mismatch-of-OpenSSL-function-signatures-that-cau.patch10 src/tpm2-tss-engine-rsa.c:805:46: error: passing argument 2 of 'EVP_PKEY_meth_set_copy' from incomp…
29 src/tpm2-tss-engine-rsa.c | 4 ++--
54 diff --git a/src/tpm2-tss-engine-rsa.c b/src/tpm2-tss-engine-rsa.c
56 --- a/src/tpm2-tss-engine-rsa.c
57 +++ b/src/tpm2-tss-engine-rsa.c
/openbmc/google-misc/subprojects/libcr51sign/src/
H A Dlibcr51sign_support.c135 RSA *rsa = NULL, *pub_rsa = NULL; in verify_signature() local
151 rsa = EVP_PKEY_get1_RSA(pkey); in verify_signature()
152 if (!rsa) in verify_signature()
156 pub_rsa = RSAPublicKey_dup(rsa); in verify_signature()
227 RSA_free(rsa); in verify_signature()
/openbmc/linux/drivers/gpu/drm/i915/gt/uc/
H A Dintel_guc_fw.c54 u32 rsa[UOS_RSA_SCRATCH_COUNT]; in guc_xfer_rsa_mmio() local
58 copied = intel_uc_fw_copy_rsa(guc_fw, rsa, sizeof(rsa)); in guc_xfer_rsa_mmio()
59 if (copied < sizeof(rsa)) in guc_xfer_rsa_mmio()
63 intel_uncore_write(uncore, UOS_RSA_SCRATCH(i), rsa[i]); in guc_xfer_rsa_mmio()
/openbmc/u-boot/tools/
H A DMakefile74 RSA_OBJS-$(CONFIG_FIT_SIGNATURE) := $(addprefix lib/rsa/, \
75 rsa-sign.o rsa-verify.o rsa-checksum.o \
76 rsa-mod-exp.o)
/openbmc/qemu/tests/unit/
H A Dtest-crypto-akcipher.c789 .u.rsa = {
809 .u.rsa = {
834 .u.rsa = {
854 .u.rsa = {
948 .u.rsa = { in test_rsakey()
/openbmc/openbmc/meta-openembedded/meta-python/recipes-devtools/python/
H A Dpython3-oauthlib_3.2.2.bb16 #PACKAGECONFIG ?= "test signedtoken signals rsa"
20 PACKAGECONFIG[rsa] = ",,,python3-cryptography"
/openbmc/linux/crypto/
H A Drsa.c352 static struct akcipher_alg rsa = { variable
372 err = crypto_register_akcipher(&rsa); in rsa_init()
378 crypto_unregister_akcipher(&rsa); in rsa_init()
388 crypto_unregister_akcipher(&rsa); in rsa_exit()
/openbmc/openbmc-test-automation/security/
H A Dtest_bmc_ssh_security.robot35 # debug2: host key algorithms: rsa-sha2-512,rsa-sha2-256,ssh-rsa
/openbmc/openbmc/poky/meta/recipes-support/nettle/nettle/
H A Dcheck-header-files-of-openssl-only-if-enable_.patch33 -AC_CHECK_HEADERS([openssl/evp.h openssl/ec.h openssl/rsa.h],,
37 + AC_CHECK_HEADERS([openssl/evp.h openssl/ec.h openssl/rsa.h],,
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/pam/
H A Dpam-ssh-agent-auth_0.10.3.bb58 # ssh-rsa.c:59:24: error: passing argument 1 of 'EVP_DigestInit' from incompatible pointer type [-W…
59 # ssh-rsa.c:60:26: error: passing argument 1 of 'EVP_DigestUpdate' from incompatible pointer type […
60 # ssh-rsa.c:61:25: error: passing argument 1 of 'EVP_DigestFinal' from incompatible pointer type [-…

1234