/openbmc/linux/drivers/crypto/ccp/ |
H A D | ccp-crypto-rsa.c | 52 req->dst_len = rctx->cmd.u.rsa.key_size >> 3; in ccp_rsa_complete() 61 return ctx->u.rsa.n_len; in ccp_rsa_maxsize() 75 rctx->cmd.u.rsa.key_size = ctx->u.rsa.key_len; /* in bits */ in ccp_rsa_crypt() 77 rctx->cmd.u.rsa.exp = &ctx->u.rsa.e_sg; in ccp_rsa_crypt() 78 rctx->cmd.u.rsa.exp_len = ctx->u.rsa.e_len; in ccp_rsa_crypt() 80 rctx->cmd.u.rsa.exp = &ctx->u.rsa.d_sg; in ccp_rsa_crypt() 81 rctx->cmd.u.rsa.exp_len = ctx->u.rsa.d_len; in ccp_rsa_crypt() 83 rctx->cmd.u.rsa.mod = &ctx->u.rsa.n_sg; in ccp_rsa_crypt() 84 rctx->cmd.u.rsa.mod_len = ctx->u.rsa.n_len; in ccp_rsa_crypt() 85 rctx->cmd.u.rsa.src = req->src; in ccp_rsa_crypt() [all …]
|
/openbmc/qemu/crypto/ |
H A D | akcipher-nettle.c.inc | 22 #include <nettle/rsa.h> 42 QCryptoNettleRSA *rsa = (QCryptoNettleRSA *)akcipher; 43 if (!rsa) { 47 rsa_public_key_clear(&rsa->pub); 48 rsa_private_key_clear(&rsa->priv); 49 g_free(rsa); 65 return qcrypto_nettle_rsa_new(&opts->u.rsa, type, key, keylen, errp); 84 static int qcrypt_nettle_parse_rsa_private_key(QCryptoNettleRSA *rsa, 96 nettle_mpz_init_set_str_256_u(rsa->pub.n, rsa_key->n.len, rsa_key->n.data); 97 nettle_mpz_init_set_str_256_u(rsa->pub.e, rsa_key->e.len, rsa_key->e.data); [all …]
|
H A D | akcipher-gcrypt.c.inc | 41 QCryptoGcryptRSA *rsa = (QCryptoGcryptRSA *)akcipher; 42 if (!rsa) { 46 gcry_sexp_release(rsa->key); 47 g_free(rsa); 64 &opts->u.rsa, type, key, keylen, errp); 84 QCryptoGcryptRSA *rsa, 149 err = gcry_sexp_build(&rsa->key, NULL, 150 "(private-key (rsa (n %m) (e %m) (d %m) (p %m) (q %m) (u %m)))", 153 err = gcry_sexp_build(&rsa->key, NULL, 154 "(private-key (rsa (n %m) (e %m) (d %m)))", n, e, d); [all …]
|
H A D | rsakey-nettle.c.inc | 61 QCryptoAkCipherRSAKey *rsa = g_new0(QCryptoAkCipherRSAKey, 1); 73 !GetMPI(&i, &rsa->n) || 74 !GetMPI(&i, &rsa->e) || 75 !GetMPI(&i, &rsa->d) || 76 !GetMPI(&i, &rsa->p) || 77 !GetMPI(&i, &rsa->q) || 78 !GetMPI(&i, &rsa->dp) || 79 !GetMPI(&i, &rsa->dq) || 80 !GetMPI(&i, &rsa->u)) { 93 return rsa; [all …]
|
H A D | rsakey-builtin.c.inc | 72 QCryptoAkCipherRSAKey *rsa = g_new0(QCryptoAkCipherRSAKey, 1); 85 &rsa->n, errp) < 0 || 87 &rsa->e, errp) < 0) { 95 return rsa; 98 qcrypto_akcipher_rsakey_free(rsa); 119 QCryptoAkCipherRSAKey *rsa = g_new0(QCryptoAkCipherRSAKey, 1); 136 &rsa->n, errp) < 0 || 138 &rsa->e, errp) < 0 || 140 &rsa->d, errp) < 0 || 141 qcrypto_der_decode_int(&seq, &seq_length, extract_mpi, &rsa->p, [all …]
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/pam/pam-ssh-agent-auth/ |
H A D | 0001-Adapt-to-OpenSSL-1.1.1.patch | 19 ssh-rsa.c | 22 +++++++-- 31 pamsshagentauth_buffer_get_bignum(&auth->identities, key->rsa->e); 32 pamsshagentauth_buffer_get_bignum(&auth->identities, key->rsa->n); 37 BN_num_bits(key->rsa->n), bits); 39 + pamsshagentauth_buffer_get_bignum(&auth->identities, RSA_get0_e(key->rsa)); 40 + pamsshagentauth_buffer_get_bignum(&auth->identities, RSA_get0_n(key->rsa)); 42 + keybits = BN_num_bits(RSA_get0_n(key->rsa)); 45 + BN_num_bits(RSA_get0_n(key->rsa)), bits); 55 pamsshagentauth_buffer_put_int(&buffer, BN_num_bits(key->rsa->n)); 56 pamsshagentauth_buffer_put_bignum(&buffer, key->rsa->e); [all …]
|
H A D | 0002-Check-against-the-correct-OPENSSL_VERSION_NUMBER.patch | 17 ssh-rsa.c | 4 ++-- 30 pamsshagentauth_buffer_get_bignum(&auth->identities, key->rsa->e); 31 pamsshagentauth_buffer_get_bignum(&auth->identities, key->rsa->n); 39 pamsshagentauth_buffer_put_int(&buffer, BN_num_bits(key->rsa->n)); 40 pamsshagentauth_buffer_put_bignum(&buffer, key->rsa->e); 41 pamsshagentauth_buffer_put_bignum(&buffer, key->rsa->n); 57 pamsshagentauth_buffer_put_bignum2(b, key->rsa->n); 58 pamsshagentauth_buffer_put_bignum2(b, key->rsa->e); 59 pamsshagentauth_buffer_put_bignum2(b, key->rsa->d); 75 pamsshagentauth_buffer_put_int(&msg, BN_num_bits(key->rsa->n)); [all …]
|
/openbmc/linux/drivers/net/ethernet/intel/ixgbe/ |
H A D | ixgbe_ipsec.c | 396 struct rx_sa *rsa; in ixgbe_ipsec_find_rx_state() local 400 hash_for_each_possible_rcu(ipsec->rx_sa_list, rsa, hlist, in ixgbe_ipsec_find_rx_state() 402 if (rsa->mode & IXGBE_RXTXMOD_VF) in ixgbe_ipsec_find_rx_state() 404 if (spi == rsa->xs->id.spi && in ixgbe_ipsec_find_rx_state() 405 ((ip4 && *daddr == rsa->xs->id.daddr.a4) || in ixgbe_ipsec_find_rx_state() 406 (!ip4 && !memcmp(daddr, &rsa->xs->id.daddr.a6, in ixgbe_ipsec_find_rx_state() 407 sizeof(rsa->xs->id.daddr.a6)))) && in ixgbe_ipsec_find_rx_state() 408 proto == rsa->xs->id.proto) { in ixgbe_ipsec_find_rx_state() 409 ret = rsa->xs; in ixgbe_ipsec_find_rx_state() 595 struct rx_sa rsa; in ixgbe_ipsec_add_sa() local [all …]
|
/openbmc/linux/drivers/net/ethernet/intel/ixgbevf/ |
H A D | ipsec.c | 183 struct rx_sa *rsa; in ixgbevf_ipsec_find_rx_state() local 186 hash_for_each_possible_rcu(ipsec->rx_sa_list, rsa, hlist, in ixgbevf_ipsec_find_rx_state() 188 if (spi == rsa->xs->id.spi && in ixgbevf_ipsec_find_rx_state() 189 ((ip4 && *daddr == rsa->xs->id.daddr.a4) || in ixgbevf_ipsec_find_rx_state() 190 (!ip4 && !memcmp(daddr, &rsa->xs->id.daddr.a6, in ixgbevf_ipsec_find_rx_state() 191 sizeof(rsa->xs->id.daddr.a6)))) && in ixgbevf_ipsec_find_rx_state() 192 proto == rsa->xs->id.proto) { in ixgbevf_ipsec_find_rx_state() 193 ret = rsa->xs; in ixgbevf_ipsec_find_rx_state() 290 struct rx_sa rsa; in ixgbevf_ipsec_add_sa() local 305 memset(&rsa, 0, sizeof(rsa)); in ixgbevf_ipsec_add_sa() [all …]
|
/openbmc/u-boot/lib/rsa/ |
H A D | rsa-sign.c | 61 RSA *rsa; in rsa_pem_get_pub_key() local 91 rsa = EVP_PKEY_get1_RSA(key); in rsa_pem_get_pub_key() 92 if (!rsa) { in rsa_pem_get_pub_key() 100 *rsap = rsa; in rsa_pem_get_pub_key() 128 RSA *rsa; in rsa_engine_get_pub_key() local 154 rsa = EVP_PKEY_get1_RSA(key); in rsa_engine_get_pub_key() 155 if (!rsa) { in rsa_engine_get_pub_key() 162 *rsap = rsa; in rsa_engine_get_pub_key() 200 RSA *rsa; in rsa_pem_get_priv_key() local 212 rsa = PEM_read_RSAPrivateKey(f, 0, NULL, path); in rsa_pem_get_priv_key() [all …]
|
H A D | Makefile | 8 obj-$(CONFIG_$(SPL_)FIT_SIGNATURE) += rsa-verify.o rsa-checksum.o 9 obj-$(CONFIG_RSA_SOFTWARE_EXP) += rsa-mod-exp.o
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-devtools/android-tools/android-tools/core/ |
H A D | adb_libssl_11.diff | 3 fix that by accessing rsa->n (and e) directly, using RSA_get0_key instead. 18 @@ -75,6 +75,7 @@ static int RSA_to_RSAPublicKey(RSA *rsa, 25 if (RSA_size(rsa) != RSANUMBYTES) { 27 @@ -82,7 +83,7 @@ static int RSA_to_RSAPublicKey(RSA *rsa, 31 - BN_copy(n, rsa->n); 32 + RSA_get0_key(rsa, &n, &e, NULL); 36 @@ -96,11 +97,10 @@ static int RSA_to_RSAPublicKey(RSA *rsa, 40 - pkey->exponent = BN_get_word(rsa->e);
|
/openbmc/linux/drivers/crypto/intel/qat/qat_common/ |
H A D | qat_asym_algs.c | 117 struct qat_rsa_input_params rsa; member 121 struct qat_rsa_output_params rsa; member 130 struct qat_rsa_ctx *rsa; member 134 struct akcipher_request *rsa; member 516 struct akcipher_request *areq = req->areq.rsa; in qat_rsa_cb() 517 struct device *dev = &GET_DEV(req->ctx.rsa->inst->accel_dev); in qat_rsa_cb() 523 dma_unmap_single(dev, req->in.rsa.enc.m, req->ctx.rsa->key_sz, in qat_rsa_cb() 528 areq->dst_len = req->ctx.rsa->key_sz; in qat_rsa_cb() 529 dma_unmap_single(dev, req->out.rsa.enc.c, req->ctx.rsa->key_sz, in qat_rsa_cb() 677 qat_req->ctx.rsa = ctx; in qat_rsa_enc() [all …]
|
/openbmc/qemu/tests/bench/ |
H A D | benchmark-crypto-akcipher.c | 29 opt.u.rsa.padding_alg = padding; in create_rsa_akcipher() 30 opt.u.rsa.hash_alg = hash; in create_rsa_akcipher() 45 g_autoptr(QCryptoAkCipher) rsa = in test_rsa_speed() 60 g_assert(qcrypto_akcipher_sign(rsa, dgst, SHA1_DGST_LEN, in test_rsa_speed() 77 g_assert(qcrypto_akcipher_verify(rsa, signature, key_size / BYTE, in test_rsa_speed() 130 ADD_TEST(rsa, 1024); in main() 131 ADD_TEST(rsa, 2048); in main() 132 ADD_TEST(rsa, 4096); in main()
|
/openbmc/linux/drivers/crypto/hisilicon/hpre/ |
H A D | hpre_crypto.c | 124 struct hpre_rsa_ctx rsa; member 139 struct akcipher_request *rsa; member 467 areq = req->areq.rsa; in hpre_rsa_cb() 532 h_req->areq.rsa = akreq; in hpre_msg_request_set() 805 akcipher_request_set_tfm(req, ctx->rsa.soft_tfm); in hpre_rsa_enc() 811 if (unlikely(!ctx->rsa.pubkey)) in hpre_rsa_enc() 819 msg->key = cpu_to_le64(ctx->rsa.dma_pubkey); in hpre_rsa_enc() 853 akcipher_request_set_tfm(req, ctx->rsa.soft_tfm); in hpre_rsa_dec() 859 if (unlikely(!ctx->rsa.prikey)) in hpre_rsa_dec() 867 msg->key = cpu_to_le64(ctx->rsa.dma_crt_prikey); in hpre_rsa_dec() [all …]
|
/openbmc/openbmc/meta-security/meta-tpm/recipes-tpm2/tpm2-tss-engine/files/ |
H A D | 0002-Fix-mismatch-of-OpenSSL-function-signatures-that-cau.patch | 10 src/tpm2-tss-engine-rsa.c:805:46: error: passing argument 2 of 'EVP_PKEY_meth_set_copy' from incomp… 29 src/tpm2-tss-engine-rsa.c | 4 ++-- 54 diff --git a/src/tpm2-tss-engine-rsa.c b/src/tpm2-tss-engine-rsa.c 56 --- a/src/tpm2-tss-engine-rsa.c 57 +++ b/src/tpm2-tss-engine-rsa.c
|
/openbmc/google-misc/subprojects/libcr51sign/src/ |
H A D | libcr51sign_support.c | 135 RSA *rsa = NULL, *pub_rsa = NULL; in verify_signature() local 151 rsa = EVP_PKEY_get1_RSA(pkey); in verify_signature() 152 if (!rsa) in verify_signature() 156 pub_rsa = RSAPublicKey_dup(rsa); in verify_signature() 227 RSA_free(rsa); in verify_signature()
|
/openbmc/linux/drivers/gpu/drm/i915/gt/uc/ |
H A D | intel_guc_fw.c | 54 u32 rsa[UOS_RSA_SCRATCH_COUNT]; in guc_xfer_rsa_mmio() local 58 copied = intel_uc_fw_copy_rsa(guc_fw, rsa, sizeof(rsa)); in guc_xfer_rsa_mmio() 59 if (copied < sizeof(rsa)) in guc_xfer_rsa_mmio() 63 intel_uncore_write(uncore, UOS_RSA_SCRATCH(i), rsa[i]); in guc_xfer_rsa_mmio()
|
/openbmc/u-boot/tools/ |
H A D | Makefile | 74 RSA_OBJS-$(CONFIG_FIT_SIGNATURE) := $(addprefix lib/rsa/, \ 75 rsa-sign.o rsa-verify.o rsa-checksum.o \ 76 rsa-mod-exp.o)
|
/openbmc/qemu/tests/unit/ |
H A D | test-crypto-akcipher.c | 789 .u.rsa = { 809 .u.rsa = { 834 .u.rsa = { 854 .u.rsa = { 948 .u.rsa = { in test_rsakey()
|
/openbmc/openbmc/meta-openembedded/meta-python/recipes-devtools/python/ |
H A D | python3-oauthlib_3.2.2.bb | 16 #PACKAGECONFIG ?= "test signedtoken signals rsa" 20 PACKAGECONFIG[rsa] = ",,,python3-cryptography"
|
/openbmc/linux/crypto/ |
H A D | rsa.c | 352 static struct akcipher_alg rsa = { variable 372 err = crypto_register_akcipher(&rsa); in rsa_init() 378 crypto_unregister_akcipher(&rsa); in rsa_init() 388 crypto_unregister_akcipher(&rsa); in rsa_exit()
|
/openbmc/openbmc-test-automation/security/ |
H A D | test_bmc_ssh_security.robot | 35 # debug2: host key algorithms: rsa-sha2-512,rsa-sha2-256,ssh-rsa
|
/openbmc/openbmc/poky/meta/recipes-support/nettle/nettle/ |
H A D | check-header-files-of-openssl-only-if-enable_.patch | 33 -AC_CHECK_HEADERS([openssl/evp.h openssl/ec.h openssl/rsa.h],, 37 + AC_CHECK_HEADERS([openssl/evp.h openssl/ec.h openssl/rsa.h],,
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/pam/ |
H A D | pam-ssh-agent-auth_0.10.3.bb | 58 # ssh-rsa.c:59:24: error: passing argument 1 of 'EVP_DigestInit' from incompatible pointer type [-W… 59 # ssh-rsa.c:60:26: error: passing argument 1 of 'EVP_DigestUpdate' from incompatible pointer type [… 60 # ssh-rsa.c:61:25: error: passing argument 1 of 'EVP_DigestFinal' from incompatible pointer type [-…
|