/openssl-master/crypto/rsa/ |
A D | rsa_ossl.c | 87 if (BN_ucmp(rsa->n, rsa->e) <= 0) { in rsa_ossl_public_encrypt() 146 if (!rsa->meth->bn_mod_exp(ret, f, rsa->e, rsa->n, ctx, in rsa_ossl_public_encrypt() 170 rsa->blinding = RSA_setup_blinding(rsa, ctx); in rsa_get_blinding() 319 (rsa->dmp1 != NULL) && (rsa->dmq1 != NULL) && (rsa->iqmp != NULL))) { in rsa_ossl_private_encrypt() 320 if (!rsa->meth->rsa_mod_exp(ret, f, rsa, ctx)) in rsa_ossl_private_encrypt() 439 (rsa->dmp1 != NULL) && (rsa->dmq1 != NULL) && (rsa->iqmp != NULL))) { in rsa_ossl_private_decrypt() 440 if (!rsa->meth->rsa_mod_exp(ret, f, rsa, ctx)) in rsa_ossl_private_decrypt() 523 if (BN_ucmp(rsa->n, rsa->e) <= 0) { in rsa_ossl_public_decrypt() 570 if (!rsa->meth->bn_mod_exp(ret, f, rsa->e, rsa->n, ctx, in rsa_ossl_public_decrypt() 912 if (rsa->e && rsa->n) { in rsa_ossl_mod_exp() [all …]
|
A D | rsa_sp800_56b_gen.c | 119 if (rsa->p == NULL || rsa->q == NULL) in ossl_rsa_fips186_4_gen_prob_primes() 142 ok = ossl_rsa_check_pminusq_diff(tmp, rsa->p, rsa->q, nbits); in ossl_rsa_fips186_4_gen_prob_primes() 149 rsa->dirty_cnt++; in ossl_rsa_fips186_4_gen_prob_primes() 258 BN_free(rsa->e); in ossl_rsa_sp800_56b_derive_params_from_pq() 281 if (rsa->n == NULL || !BN_mul(rsa->n, rsa->p, rsa->q, ctx)) in ossl_rsa_sp800_56b_derive_params_from_pq() 290 if (!BN_mod(rsa->dmp1, rsa->d, p1, ctx)) in ossl_rsa_sp800_56b_derive_params_from_pq() 299 if (!BN_mod(rsa->dmq1, rsa->d, q1, ctx)) in ossl_rsa_sp800_56b_derive_params_from_pq() 308 if (BN_mod_inverse(rsa->iqmp, rsa->q, rsa->p, ctx) == NULL) in ossl_rsa_sp800_56b_derive_params_from_pq() 311 rsa->dirty_cnt++; in ossl_rsa_sp800_56b_derive_params_from_pq() 432 && BN_mod_exp(tmp, k, rsa->e, rsa->n, ctx) in ossl_rsa_sp800_56b_pairwise_test() [all …]
|
A D | rsa_gen.c | 44 return rsa->meth->rsa_keygen(rsa, bits, e_value, cb); in RSA_generate_key_ex() 126 if (!rsa->n && ((rsa->n = BN_new()) == NULL)) in rsa_multiprime_keygen() 128 if (!rsa->d && ((rsa->d = BN_secure_new()) == NULL)) in rsa_multiprime_keygen() 131 if (!rsa->e && ((rsa->e = BN_new()) == NULL)) in rsa_multiprime_keygen() 133 if (!rsa->p && ((rsa->p = BN_secure_new()) == NULL)) in rsa_multiprime_keygen() 136 if (!rsa->q && ((rsa->q = BN_secure_new()) == NULL)) in rsa_multiprime_keygen() 242 if (!BN_mul(r1, rsa->p, rsa->q, ctx)) in rsa_multiprime_keygen() 314 if (BN_cmp(rsa->p, rsa->q) < 0) { in rsa_multiprime_keygen() 316 rsa->p = rsa->q; in rsa_multiprime_keygen() 348 if (!BN_mod_inverse(rsa->d, rsa->e, pr0, ctx)) { in rsa_multiprime_keygen() [all …]
|
A D | rsa_x931g.c | 34 if (!rsa) in RSA_X931_derive_ex() 49 if (!rsa->e) { in RSA_X931_derive_ex() 51 if (!rsa->e) in RSA_X931_derive_ex() 54 e = rsa->e; in RSA_X931_derive_ex() 81 if (rsa->p == NULL || rsa->q == NULL) { in RSA_X931_derive_ex() 96 if (!BN_mul(rsa->n, rsa->p, rsa->q, ctx)) in RSA_X931_derive_ex() 117 rsa->d = BN_mod_inverse(NULL, rsa->e, r0, ctx2); /* d */ in RSA_X931_derive_ex() 125 if (!BN_mod(rsa->dmp1, rsa->d, r1, ctx)) in RSA_X931_derive_ex() 132 if (!BN_mod(rsa->dmq1, rsa->d, r2, ctx)) in RSA_X931_derive_ex() 136 rsa->iqmp = BN_mod_inverse(NULL, rsa->q, rsa->p, ctx2); in RSA_X931_derive_ex() [all …]
|
A D | rsa_sp800_56b_check.c | 30 if (rsa->dmp1 == NULL || rsa->dmq1 == NULL || rsa->iqmp == NULL) { in ossl_rsa_check_crt_components() 31 if (rsa->dmp1 != NULL || rsa->dmq1 != NULL || rsa->iqmp != NULL) in ossl_rsa_check_crt_components() 63 && (BN_cmp(rsa->iqmp, rsa->p) < 0) in ossl_rsa_check_crt_components() 65 && BN_mod_mul(r, rsa->dmp1, rsa->e, p1, ctx) in ossl_rsa_check_crt_components() 68 && BN_mod_mul(r, rsa->dmq1, rsa->e, q1, ctx) in ossl_rsa_check_crt_components() 71 && BN_mod_mul(r, rsa->iqmp, rsa->q, rsa->p, ctx) in ossl_rsa_check_crt_components() 209 && BN_mod_mul(r, rsa->e, rsa->d, lcm, ctx) in ossl_rsa_check_private_exponent() 288 if (rsa->n == NULL || rsa->e == NULL) 352 if (rsa->d == NULL || rsa->n == NULL) 354 return BN_cmp(rsa->d, BN_value_one()) >= 0 && BN_cmp(rsa->d, rsa->n) < 0; [all …]
|
A D | rsa_crpt.c | 36 return rsa->meth->rsa_pub_enc(flen, from, to, rsa, padding); in RSA_public_encrypt() 42 return rsa->meth->rsa_priv_enc(flen, from, to, rsa, padding); in RSA_private_encrypt() 48 return rsa->meth->rsa_priv_dec(flen, from, to, rsa, padding); in RSA_private_decrypt() 54 return rsa->meth->rsa_pub_dec(flen, from, to, rsa, padding); in RSA_public_decrypt() 65 rsa->blinding = NULL; in RSA_blinding_off() 74 if (rsa->blinding != NULL) in RSA_blinding_on() 77 rsa->blinding = RSA_setup_blinding(rsa, ctx); in RSA_blinding_on() 136 if (rsa->e == NULL) { in RSA_setup_blinding() 137 e = rsa_get_public_exp(rsa->d, rsa->p, rsa->q, ctx); in RSA_setup_blinding() 143 e = rsa->e; in RSA_setup_blinding() [all …]
|
A D | rsa_backend.c | 70 if (rsa == NULL) in ossl_rsa_fromdata() 84 if (!RSA_set0_key(rsa, n, e, d)) in ossl_rsa_fromdata() 331 if (rsa->engine != NULL || RSA_get_method(rsa) != RSA_PKCS1_OpenSSL()) in ossl_rsa_is_foreign() 352 if (ossl_rsa_is_foreign(rsa)) in ossl_rsa_dup() 386 dupkey->flags = rsa->flags; in ossl_rsa_dup() 420 if (rsa->pss != NULL) { in ossl_rsa_dup() 468 if (rsa != NULL in ossl_rsa_sync_to_pss_params_30() 561 RSA *rsa; in ossl_rsa_key_from_pkcs8() local 568 if (rsa == NULL) { in ossl_rsa_key_from_pkcs8() 573 RSA_free(rsa); in ossl_rsa_key_from_pkcs8() [all …]
|
A D | rsa_local.h | 106 unsigned char *to, RSA *rsa, int padding); 108 unsigned char *to, RSA *rsa, int padding); 119 int (*init) (RSA *rsa); 121 int (*finish) (RSA *rsa); 135 const RSA *rsa); 138 unsigned int siglen, const RSA *rsa); 162 int ossl_rsa_multip_calc_product(RSA *rsa); 176 int ossl_rsa_check_crt_components(const RSA *rsa, BN_CTX *ctx); 178 int ossl_rsa_sp800_56b_pairwise_test(RSA *rsa, BN_CTX *ctx); 179 int ossl_rsa_sp800_56b_check_public(const RSA *rsa); [all …]
|
A D | rsa_ameth.c | 32 const RSA *rsa = pkey->pkey.rsa; in rsa_param_encode() local 78 RSA *rsa = NULL; in rsa_pub_decode() local 85 RSA_free(rsa); in rsa_pub_decode() 103 RSA_free(rsa); in rsa_pub_decode() 120 if (BN_cmp(b->pkey.rsa->n, a->pkey.rsa->n) != 0 in rsa_pub_cmp() 121 || BN_cmp(b->pkey.rsa->e, a->pkey.rsa->e) != 0) in rsa_pub_cmp() 129 RSA *rsa; in old_rsa_priv_decode() local 174 if (rsa != NULL) { in rsa_priv_decode() 733 RSA *rsa = from->pkey.rsa; in rsa_int_export_to() local 742 if (RSA_get0_n(rsa) == NULL || RSA_get0_e(rsa) == NULL) in rsa_int_export_to() [all …]
|
A D | rsa_meth.c | 108 unsigned char *to, RSA *rsa, int padding) in RSA_meth_get_pub_enc() 124 unsigned char *to, RSA *rsa, int padding) in RSA_meth_get_pub_dec() 140 unsigned char *to, RSA *rsa, int padding) in RSA_meth_get_priv_enc() 156 unsigned char *to, RSA *rsa, int padding) in RSA_meth_get_priv_dec() 172 (BIGNUM *r0, const BIGNUM *i, RSA *rsa, BN_CTX *ctx) in RSA_meth_get_mod_exp() 206 int (*RSA_meth_get_init(const RSA_METHOD *meth)) (RSA *rsa) in RSA_meth_get_init() 218 int (*RSA_meth_get_finish(const RSA_METHOD *meth)) (RSA *rsa) in RSA_meth_get_finish() 233 const RSA *rsa) in RSA_meth_get_sign() 242 const RSA *rsa)) in RSA_meth_set_sign() argument 251 unsigned int siglen, const RSA *rsa) in RSA_meth_get_verify() [all …]
|
A D | rsa_pmeth.c | 326 int klen = RSA_size(rsa); in pkey_rsa_encrypt() 738 if (rsa->pss == NULL) in rsa_set_pss_param() 745 RSA *rsa = NULL; in pkey_rsa_keygen() local 755 rsa = RSA_new(); in pkey_rsa_keygen() 756 if (rsa == NULL) in pkey_rsa_keygen() 761 RSA_free(rsa); in pkey_rsa_keygen() 772 RSA_free(rsa); in pkey_rsa_keygen() 778 RSA_free(rsa); in pkey_rsa_keygen() 829 const RSA *rsa; in pkey_pss_init() local 840 if (rsa->pss == NULL) in pkey_pss_init() [all …]
|
A D | rsa_depr.c | 34 RSA *rsa = RSA_new(); in RSA_generate_key() local 37 if (cb == NULL || rsa == NULL || e == NULL) in RSA_generate_key() 52 if (RSA_generate_key_ex(rsa, bits, e, cb)) { in RSA_generate_key() 55 return rsa; in RSA_generate_key() 59 RSA_free(rsa); in RSA_generate_key()
|
A D | rsa_sign.c | 274 unsigned char *sigret, unsigned int *siglen, RSA *rsa) in RSA_sign() argument 282 if (rsa->meth->rsa_sign != NULL) in RSA_sign() 283 return rsa->meth->rsa_sign(type, m, m_len, sigret, siglen, rsa); in RSA_sign() 305 if (encoded_len + RSA_PKCS1_PADDING_SIZE > (size_t)RSA_size(rsa)) { in RSA_sign() 333 const unsigned char *sigbuf, size_t siglen, RSA *rsa) in ossl_rsa_verify() argument 339 if (siglen != (size_t)RSA_size(rsa)) { in ossl_rsa_verify() 351 len = RSA_public_decrypt((int)siglen, sigbuf, decrypt_buf, rsa, in ossl_rsa_verify() 450 const unsigned char *sigbuf, unsigned int siglen, RSA *rsa) in RSA_verify() argument 453 if (rsa->meth->rsa_verify != NULL) in RSA_verify() 454 return rsa->meth->rsa_verify(type, m, m_len, sigbuf, siglen, rsa); in RSA_verify() [all …]
|
A D | rsa_saos.c | 26 RSA *rsa) in RSA_sign_ASN1_OCTET_STRING() argument 37 j = RSA_size(rsa); in RSA_sign_ASN1_OCTET_STRING() 49 i = RSA_private_encrypt(i, s, sigret, rsa, RSA_PKCS1_PADDING); in RSA_sign_ASN1_OCTET_STRING() 62 unsigned int siglen, RSA *rsa) in RSA_verify_ASN1_OCTET_STRING() argument 69 if (siglen != (unsigned int)RSA_size(rsa)) { in RSA_verify_ASN1_OCTET_STRING() 79 i = RSA_public_decrypt((int)siglen, sigbuf, s, rsa, RSA_PKCS1_PADDING); in RSA_verify_ASN1_OCTET_STRING()
|
/openssl-master/ssl/ |
A D | ssl_rsa_legacy.c | 22 if (rsa == NULL) { in SSL_use_RSAPrivateKey() 31 RSA_up_ref(rsa); in SSL_use_RSAPrivateKey() 33 RSA_free(rsa); in SSL_use_RSAPrivateKey() 47 RSA *rsa = NULL; in SSL_use_RSAPrivateKey_file() local 76 RSA_free(rsa); in SSL_use_RSAPrivateKey_file() 86 RSA *rsa; in SSL_use_RSAPrivateKey_ASN1() local 95 RSA_free(rsa); in SSL_use_RSAPrivateKey_ASN1() 113 RSA_up_ref(rsa); in SSL_CTX_use_RSAPrivateKey() 158 RSA_free(rsa); in SSL_CTX_use_RSAPrivateKey_file() 169 RSA *rsa; in SSL_CTX_use_RSAPrivateKey_ASN1() local [all …]
|
/openssl-master/include/openssl/ |
A D | rsa.h | 364 RSA *rsa); 490 int RSA_meth_set_pub_enc(RSA_METHOD *rsa, 500 int RSA_meth_set_pub_dec(RSA_METHOD *rsa, 510 int RSA_meth_set_priv_enc(RSA_METHOD *rsa, 520 int RSA_meth_set_priv_dec(RSA_METHOD *rsa, 529 int RSA_meth_set_mod_exp(RSA_METHOD *rsa, 550 int RSA_meth_set_init(RSA_METHOD *rsa, int (*init) (RSA *rsa)); 554 int RSA_meth_set_finish(RSA_METHOD *rsa, int (*finish) (RSA *rsa)); 563 int RSA_meth_set_sign(RSA_METHOD *rsa, 576 int RSA_meth_set_verify(RSA_METHOD *rsa, [all …]
|
/openssl-master/providers/implementations/keymgmt/ |
A D | rsa_kmgmt.c | 81 RSA *rsa; in rsa_newdata() local 87 if (rsa != NULL) { in rsa_newdata() 91 return rsa; in rsa_newdata() 97 RSA *rsa; in rsapss_newdata() local 103 if (rsa != NULL) { in rsapss_newdata() 107 return rsa; in rsapss_newdata() 303 RSA *rsa = key; in rsa_get_params() local 597 rsa = rsa_tmp; in rsa_gen() 602 return rsa; in rsa_gen() 622 RSA *rsa = NULL; in common_load() local [all …]
|
/openssl-master/doc/man7/ |
A D | EVP_PKEY-RSA.pod | 36 =item "rsa-factor1" (B<OSSL_PKEY_PARAM_RSA_FACTOR1>) <unsigned integer> 38 =item "rsa-factor2" (B<OSSL_PKEY_PARAM_RSA_FACTOR2>) <unsigned integer> 40 =item "rsa-factor3" (B<OSSL_PKEY_PARAM_RSA_FACTOR3>) <unsigned integer> 42 =item "rsa-factor4" (B<OSSL_PKEY_PARAM_RSA_FACTOR4>) <unsigned integer> 44 =item "rsa-factor5" (B<OSSL_PKEY_PARAM_RSA_FACTOR5>) <unsigned integer> 46 =item "rsa-factor6" (B<OSSL_PKEY_PARAM_RSA_FACTOR6>) <unsigned integer> 48 =item "rsa-factor7" (B<OSSL_PKEY_PARAM_RSA_FACTOR7>) <unsigned integer> 50 =item "rsa-factor8" (B<OSSL_PKEY_PARAM_RSA_FACTOR8>) <unsigned integer> 52 =item "rsa-factor9" (B<OSSL_PKEY_PARAM_RSA_FACTOR9>) <unsigned integer> 54 =item "rsa-factor10" (B<OSSL_PKEY_PARAM_RSA_FACTOR10>) <unsigned integer> [all …]
|
/openssl-master/doc/man3/ |
A D | RSA_meth_new.pod | 21 #include <openssl/rsa.h> 43 int RSA_meth_set_pub_enc(RSA_METHOD *rsa, 51 int RSA_meth_set_pub_dec(RSA_METHOD *rsa, 59 int RSA_meth_set_priv_enc(RSA_METHOD *rsa, 66 int RSA_meth_set_priv_dec(RSA_METHOD *rsa, 73 int RSA_meth_set_mod_exp(RSA_METHOD *rsa, 88 int RSA_meth_set_init(RSA_METHOD *rsa, int (*init (RSA *rsa)); 92 int RSA_meth_set_finish(RSA_METHOD *rsa, int (*finish)(RSA *rsa)); 98 int RSA_meth_set_sign(RSA_METHOD *rsa, 107 int RSA_meth_set_verify(RSA_METHOD *rsa, [all …]
|
A D | RSA_public_encrypt.pod | 9 #include <openssl/rsa.h> 16 unsigned char *to, RSA *rsa, int padding); 19 unsigned char *to, RSA *rsa, int padding); 29 session key) using the public key B<rsa> and stores the ciphertext in 30 B<to>. B<to> must point to RSA_size(B<rsa>) bytes of memory. 56 based padding modes, not more than RSA_size(B<rsa>) - 42 for 63 RSA_size(B<rsa>) bytes. 68 be equal to RSA_size(B<rsa>) but may be smaller, when leading zero 72 data (which is equal to RSA_size(B<rsa>) for RSA_NO_PADDING, 74 RSA_size(B<rsa>) - 42 for RSA_PKCS1_OAEP_PADDING). [all …]
|
A D | RSA_size.pod | 9 #include <openssl/rsa.h> 11 int RSA_bits(const RSA *rsa); 17 int RSA_size(const RSA *rsa); 19 int RSA_security_bits(const RSA *rsa); 25 B<rsa> and B<rsa-E<gt>n> must not be B<NULL>. 35 RSA_security_bits() returns the number of security bits of the given B<rsa>
|
/openssl-master/test/ |
A D | pem_read_depr_test.c | 153 RSA *rsa = NULL; in test_read_rsa_private() local 158 rsa = PEM_read_bio_RSAPrivateKey(infile, NULL, NULL, NULL); in test_read_rsa_private() 159 if (!TEST_ptr(rsa)) in test_read_rsa_private() 166 RSA_free(rsa); in test_read_rsa_private() 174 RSA *rsa = NULL; in test_read_rsa_public() local 179 rsa = PEM_read_bio_RSA_PUBKEY(infile, NULL, NULL, NULL); in test_read_rsa_public() 180 if (!TEST_ptr(rsa)) in test_read_rsa_public() 187 RSA_free(rsa); in test_read_rsa_public()
|
/openssl-master/providers/implementations/kem/ |
A D | rsa_kem.c | 56 RSA *rsa; member 99 RSA_free(prsactx->rsa); in rsakem_freectx() 113 if (dstctx->rsa != NULL && !RSA_up_ref(dstctx->rsa)) { in rsakem_dupctx() 133 RSA_free(prsactx->rsa); in rsakem_init() 134 prsactx->rsa = vrsa; in rsakem_init() 252 nlen = RSA_size(prsactx->rsa); in rsasve_generate() 271 if (!rsasve_gen_rand_bytes(prsactx->rsa, secret, nlen)) in rsasve_generate() 275 ret = RSA_public_encrypt(nlen, secret, out, prsactx->rsa, RSA_NO_PADDING); in rsasve_generate() 299 nlen = RSA_size(prsactx->rsa); in rsasve_recover() 316 return (RSA_private_decrypt(inlen, in, out, prsactx->rsa, RSA_NO_PADDING) > 0); in rsasve_recover()
|
/openssl-master/providers/implementations/signature/ |
A D | rsa_sig.c | 79 RSA *rsa; member 204 if ((RSA_bits(ctx->rsa) & 0x7) == 1) in rsa_pss_compute_saltlen() 403 RSA_free(prsactx->rsa); in rsa_signverify_init() 404 prsactx->rsa = vrsa; in rsa_signverify_init() 516 size_t rsasize = RSA_size(prsactx->rsa); in rsa_sign() 680 *routlen = RSA_size(prsactx->rsa); in rsa_verify_recover() 770 prsactx->rsa)) { in rsa_verify() 972 RSA_free(prsactx->rsa); in rsa_freectx() 992 dstctx->rsa = NULL; in rsa_dupctx() 998 if (srcctx->rsa != NULL && !RSA_up_ref(srcctx->rsa)) in rsa_dupctx() [all …]
|
/openssl-master/providers/implementations/asymciphers/ |
A D | rsa_enc.c | 65 RSA *rsa; member 107 RSA_free(prsactx->rsa); in rsa_init() 108 prsactx->rsa = vrsa; in rsa_init() 111 switch (RSA_test_flags(prsactx->rsa, RSA_FLAG_TYPE_MASK)) { in rsa_init() 145 size_t len = RSA_size(prsactx->rsa); in rsa_encrypt() 156 int rsasize = RSA_size(prsactx->rsa); in rsa_encrypt() 200 size_t len = RSA_size(prsactx->rsa); in rsa_decrypt() 289 RSA_free(prsactx->rsa); in rsa_freectx() 311 if (dstctx->rsa != NULL && !RSA_up_ref(dstctx->rsa)) { in rsa_dupctx() 317 RSA_free(dstctx->rsa); in rsa_dupctx() [all …]
|