/openbmc/u-boot/lib/rsa/ |
H A D | Kconfig | 1 config RSA config 2 bool "Use RSA Library" 7 RSA support. This enables the RSA algorithm used for FIT image 10 The Modular Exponentiation algorithm in RSA is implemented using 17 if RSA 20 bool "Use RSA Library within SPL" 23 bool "Enable driver for RSA Modular Exponentiation in software" 26 Enables driver for modular exponentiation in software. This is a RSA 27 algorithm used in FIT image verification. It required RSA Key as 32 bool "Enable RSA Modular Exponentiation with FSL crypto accelerator" [all …]
|
H A D | rsa-sign.c | 25 static void RSA_get0_key(const RSA *r, in RSA_get0_key() 61 RSA *rsa; in rsa_pem_get_pub_key() 123 ENGINE *engine, RSA **rsap) in rsa_engine_get_pub_key() 128 RSA *rsa; in rsa_engine_get_pub_key() 181 ENGINE *engine, RSA **rsap) in rsa_get_pub_key() 197 RSA **rsap) in rsa_pem_get_priv_key() 200 RSA *rsa; in rsa_pem_get_priv_key() 234 ENGINE *engine, RSA **rsap) in rsa_engine_get_priv_key() 239 RSA *rsa; in rsa_engine_get_priv_key() 493 RSA *rsa; in rsa_sign() [all …]
|
/openbmc/linux/Documentation/devicetree/bindings/crypto/ |
H A D | aspeed,ast2600-acry.yaml | 7 title: ASPEED ACRY ECDSA/RSA Hardware Accelerator Engines 13 The ACRY ECDSA/RSA engines is designed to accelerate the throughput 14 of ECDSA/RSA signature and verification. Basically, ACRY can be 15 divided into two independent engines - ECC Engine and RSA Engine.
|
/openbmc/openbmc/poky/meta/files/common-licenses/ |
H A D | RSA-MD | 1 Copyright (C) 1991-2, RSA Data Security, Inc. Created 1991. All rights reserved. 3 License to copy and use this software is granted provided that it is identified as the "RSA Data Se… 5 …ivative works provided that such works are identified as "derived from the RSA Data Security, Inc.… 7 RSA Data Security, Inc. makes no representations concerning either the merchantability of this soft…
|
/openbmc/openbmc/meta-openembedded/meta-perl/recipes-perl/libcrypt/ |
H A D | libcrypt-openssl-rsa-perl_0.33.bb | 1 SUMMARY = "Crypt Openssl RSA cpan module" 6 SRC_URI = "http://www.cpan.org/modules/by-module/Crypt/Crypt-OpenSSL-RSA-${PV}.tar.gz \ 24 S = "${WORKDIR}/Crypt-OpenSSL-RSA-${PV}"
|
/openbmc/linux/drivers/crypto/aspeed/ |
H A D | Kconfig | 51 bool "Enable Aspeed ACRY RSA Engine" 56 Select here to enable Aspeed ECC/RSA Engine (ACRY) 57 RSA driver. 58 Supports 256 bits to 4096 bits RSA encryption/decryption
|
/openbmc/u-boot/drivers/crypto/rsa_mod_exp/ |
H A D | Kconfig | 2 bool "Enable Driver Model for RSA Modular Exponentiation" 5 If you want to use driver model for RSA Modular Exponentiation, say Y.
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-devtools/android-tools/android-tools/core/ |
H A D | adb_libssl_11.diff | 18 @@ -75,6 +75,7 @@ static int RSA_to_RSAPublicKey(RSA *rsa, 26 @@ -82,7 +83,7 @@ static int RSA_to_RSAPublicKey(RSA *rsa, 35 @@ -96,7 +97,7 @@ static int RSA_to_RSAPublicKey(RSA *rsa,
|
/openbmc/u-boot/tools/ |
H A D | kwbimage.c | 28 static void RSA_get0_key(const RSA *r, in RSA_get0_key() 392 RSA *rsa; in kwb_load_rsa_key() 420 RSA **p_key) in kwb_load_cfg_key() 423 RSA *key; in kwb_load_cfg_key() 497 RSA *rsa; in kwb_import_pubkey() 663 int kwb_verify(RSA *key, void *data, int datasz, struct sig_v1 *sig, in kwb_verify() 1107 int export_pub_kak_hash(RSA *kak, struct secure_hdr_v1 *secure_hdr) in export_pub_kak_hash() 1122 struct secure_hdr_v1 *secure_hdr, RSA *csk) in kwb_sign_csk_with_kak() 1124 RSA *kak = NULL; in kwb_sign_csk_with_kak() 1125 RSA *kak_pub = NULL; in kwb_sign_csk_with_kak() [all …]
|
/openbmc/u-boot/drivers/crypto/ |
H A D | Kconfig | 36 bool "ASPEED ECC/RSA Engine" 39 Select this option to enable a driver for using the ECC/RSA engine in 42 Enabling this allows the use of ECC/RSA operations in hardware without requiring the
|
/openbmc/qemu/tests/keys/ |
H A D | id_rsa | 1 -----BEGIN RSA PRIVATE KEY----- 27 -----END RSA PRIVATE KEY-----
|
H A D | vagrant | 1 -----BEGIN RSA PRIVATE KEY----- 27 -----END RSA PRIVATE KEY-----
|
/openbmc/u-boot/doc/ |
H A D | README.armada-secureboot | 29 * Load the header block of the boot image, extract a special "root" public RSA 32 * Load an array of code signing public RSA keys from the header block, and 33 verify its RSA signature (contained in the header block as well) using the 34 "root" RSA key. 67 CSK - Code Signing Key(s): An array of RSA key pairs, which 70 KAK - Key Authentication Key: A RSA key pair, which is used 128 of a RSA-2048 public key in DER format with a length of 158 8) Verify the binary image's RSA signature from the secured header with the 210 KAK - The name of the KAK RSA private key file in the U-Boot 212 CSK - The name of the (active) CSK RSA private key file in the [all …]
|
H A D | README.esbc_validate | 11 SHA-256 and RSA operations are performed using SEC block in HW. 17 Validates signature using RSA verification.
|
/openbmc/linux/tools/testing/selftests/sgx/ |
H A D | sign_key.pem | 1 -----BEGIN RSA PRIVATE KEY----- 39 -----END RSA PRIVATE KEY-----
|
H A D | sigstruct.c | 153 static inline const BIGNUM *get_modulus(RSA *key) in get_modulus() 161 static RSA *gen_sign_key(void) in gen_sign_key() 165 RSA *key; in gen_sign_key() 323 RSA *key = NULL; in encl_measure()
|
/openbmc/bmcweb/redfish-core/include/generated/enums/ |
H A D | key.hpp | 10 RSA, enumerator 54 {SSHKeyType::RSA, "RSA"},
|
/openbmc/openbmc/meta-phosphor/recipes-core/dropbear/dropbear/ |
H A D | dropbearkey.service | 5 # Set the default RSA key path then load environment variables from the 6 # environment file, which might override the default RSA key path.
|
/openbmc/phosphor-rest-server/servers/gevent/ |
H A D | cert.pem | 20 -----BEGIN RSA PRIVATE KEY----- 46 -----END RSA PRIVATE KEY-----
|
/openbmc/phosphor-rest-server/servers/rocket/ |
H A D | cert.pem | 20 -----BEGIN RSA PRIVATE KEY----- 46 -----END RSA PRIVATE KEY-----
|
/openbmc/phosphor-rest-server/servers/ |
H A D | cert.pem | 20 -----BEGIN RSA PRIVATE KEY----- 46 -----END RSA PRIVATE KEY-----
|
/openbmc/qemu/crypto/ |
H A D | akcipher-gcrypt.c.inc | 101 error_setg(errp, "Failed to parse RSA parameter n: %s/%s", 109 error_setg(errp, "Failed to parse RSA parameter e: %s/%s", 117 error_setg(errp, "Failed to parse RSA parameter d: %s/%s", 125 error_setg(errp, "Failed to parse RSA parameter p: %s/%s", 133 error_setg(errp, "Failed to parse RSA parameter q: %s/%s", 157 error_setg(errp, "Failed to build RSA private key: %s/%s", 193 error_setg(errp, "Failed to parse RSA parameter n: %s/%s", 201 error_setg(errp, "Failed to parse RSA parameter e: %s/%s", 209 error_setg(errp, "Failed to build RSA public key: %s/%s", 285 /* We always padding leading-zeros for RSA-RAW */ [all …]
|
H A D | akcipher-nettle.c.inc | 108 error_setg(errp, "Failed to check RSA key"); 122 error_setg(errp, "Failed to check RSA key"); 149 error_setg(errp, "Failed to check RSA key"); 185 /* Nettle do not support RSA encryption without any padding */ 188 error_setg(errp, "RSA with raw padding is not supported"); 227 error_setg(errp, "RSA with raw padding is not supported"); 257 * The RSA algorithm cannot be used for signature/verification 324 * The RSA algorithm cannot be used for signature/verification
|
/openbmc/openbmc/meta-aspeed/recipes-bsp/u-boot/files/ |
H A D | rsa_oem_dss_key.pem | 9 -----BEGIN RSA PRIVATE KEY----- 59 -----END RSA PRIVATE KEY-----
|
/openbmc/qemu/tests/qemu-iotests/ |
H A D | common.tls | 66 -----BEGIN RSA PRIVATE KEY----- 104 -----END RSA PRIVATE KEY-----
|