| /mbedtls/library/ |
| A D | psa_crypto_rsa.c | 140 mbedtls_rsa_free(rsa); in mbedtls_psa_rsa_import_key() 141 mbedtls_free(rsa); in mbedtls_psa_rsa_import_key() 210 mbedtls_rsa_free(rsa); in mbedtls_psa_rsa_export_public_key() 211 mbedtls_free(rsa); in mbedtls_psa_rsa_export_public_key() 260 mbedtls_rsa_init(&rsa); in mbedtls_psa_rsa_generate_key() 273 mbedtls_rsa_free(&rsa); in mbedtls_psa_rsa_generate_key() 387 mbedtls_rsa_free(rsa); in mbedtls_psa_rsa_sign_hash() 388 mbedtls_free(rsa); in mbedtls_psa_rsa_sign_hash() 486 mbedtls_rsa_free(rsa); in mbedtls_psa_rsa_verify_hash() 487 mbedtls_free(rsa); in mbedtls_psa_rsa_verify_hash() [all …]
|
| A D | pk_wrap.c | 61 return mbedtls_rsa_get_bitlen(rsa); in rsa_get_bitlen() 78 size_t rsa_len = mbedtls_rsa_get_len(rsa); in rsa_verify_wrap() 136 size_t rsa_len = mbedtls_rsa_get_len(rsa); in rsa_verify_wrap() 267 *sig_len = mbedtls_rsa_get_len(rsa); in rsa_sign_wrap() 297 if (ilen != mbedtls_rsa_get_len(rsa)) { in rsa_decrypt_wrap() 301 key_len = mbedtls_rsa_write_key(rsa, buf, &p); in rsa_decrypt_wrap() 352 if (ilen != mbedtls_rsa_get_len(rsa)) { in rsa_decrypt_wrap() 380 if (mbedtls_rsa_get_len(rsa) > osize) { in rsa_encrypt_wrap() 433 *olen = mbedtls_rsa_get_len(rsa); in rsa_encrypt_wrap() 482 items->value = &(rsa->N); in rsa_debug() [all …]
|
| A D | rsa_internal.h | 34 int mbedtls_rsa_parse_key(mbedtls_rsa_context *rsa, const unsigned char *key, size_t keylen); 50 int mbedtls_rsa_parse_pubkey(mbedtls_rsa_context *rsa, const unsigned char *key, size_t keylen); 72 int mbedtls_rsa_write_key(const mbedtls_rsa_context *rsa, unsigned char *start, 95 int mbedtls_rsa_write_pubkey(const mbedtls_rsa_context *rsa, unsigned char *start,
|
| A D | rsa.c | 125 (ret = mbedtls_rsa_import(rsa, &T, NULL, NULL, in mbedtls_rsa_parse_key() 206 if ((ret = mbedtls_rsa_complete(rsa)) != 0 || in mbedtls_rsa_parse_key() 220 mbedtls_rsa_free(rsa); in mbedtls_rsa_parse_key() 273 if (mbedtls_rsa_complete(rsa) != 0 || in mbedtls_rsa_parse_pubkey() 274 mbedtls_rsa_check_pubkey(rsa) != 0) { in mbedtls_rsa_parse_pubkey() 2921 mbedtls_rsa_context rsa; in mbedtls_rsa_self_test() local 2932 mbedtls_rsa_init(&rsa); in mbedtls_rsa_self_test() 2945 MBEDTLS_MPI_CHK(mbedtls_rsa_complete(&rsa)); in mbedtls_rsa_self_test() 2951 if (mbedtls_rsa_check_pubkey(&rsa) != 0 || in mbedtls_rsa_self_test() 2952 mbedtls_rsa_check_privkey(&rsa) != 0) { in mbedtls_rsa_self_test() [all …]
|
| A D | pk.c | 384 static psa_algorithm_t psa_algorithm_for_rsa(const mbedtls_rsa_context *rsa, in psa_algorithm_for_rsa() argument 387 if (mbedtls_rsa_get_padding_mode(rsa) == MBEDTLS_RSA_PKCS_V21) { in psa_algorithm_for_rsa() 389 mbedtls_md_type_t md_type = (mbedtls_md_type_t) mbedtls_rsa_get_md_alg(rsa); in psa_algorithm_for_rsa() 445 mbedtls_rsa_context *rsa = mbedtls_pk_rsa(*pk); in mbedtls_pk_get_psa_attributes() local 446 int has_private = (mbedtls_rsa_check_privkey(rsa) == 0); in mbedtls_pk_get_psa_attributes() 455 psa_algorithm_for_rsa(rsa, want_crypt)); in mbedtls_pk_get_psa_attributes()
|
| /mbedtls/programs/pkey/ |
| A D | rsa_sign.c | 38 mbedtls_rsa_context rsa; in main() local 44 mbedtls_rsa_init(&rsa); in main() 83 if ((ret = mbedtls_rsa_import(&rsa, &N, &P, &Q, &D, &E)) != 0) { in main() 89 if ((ret = mbedtls_rsa_complete(&rsa)) != 0) { in main() 97 if ((ret = mbedtls_rsa_check_privkey(&rsa)) != 0) { in main() 117 if ((ret = mbedtls_rsa_pkcs1_sign(&rsa, NULL, NULL, MBEDTLS_MD_SHA256, in main() 134 for (i = 0; i < mbedtls_rsa_get_len(&rsa); i++) { in main() 147 mbedtls_rsa_free(&rsa); in main()
|
| A D | rsa_verify.c | 39 mbedtls_rsa_context rsa; in main() local 45 mbedtls_rsa_init(&rsa); in main() 70 (ret = mbedtls_rsa_import(&rsa, &N, NULL, NULL, NULL, &E) != 0)) { in main() 95 if (i != mbedtls_rsa_get_len(&rsa)) { in main() 114 if ((ret = mbedtls_rsa_pkcs1_verify(&rsa, MBEDTLS_MD_SHA256, in main() 127 mbedtls_rsa_free(&rsa); in main()
|
| A D | rsa_decrypt.c | 43 mbedtls_rsa_context rsa; in main() local 67 mbedtls_rsa_init(&rsa); in main() 107 if ((ret = mbedtls_rsa_import(&rsa, &N, &P, &Q, &D, &E)) != 0) { in main() 113 if ((ret = mbedtls_rsa_complete(&rsa)) != 0) { in main() 136 if (i != mbedtls_rsa_get_len(&rsa)) { in main() 147 ret = mbedtls_rsa_pkcs1_decrypt(&rsa, mbedtls_ctr_drbg_random, in main() 165 mbedtls_rsa_free(&rsa); in main()
|
| A D | rsa_encrypt.c | 41 mbedtls_rsa_context rsa; in main() local 63 mbedtls_rsa_init(&rsa); in main() 94 if ((ret = mbedtls_rsa_import(&rsa, &N, NULL, NULL, NULL, &E)) != 0) { in main() 113 ret = mbedtls_rsa_pkcs1_encrypt(&rsa, mbedtls_ctr_drbg_random, in main() 129 for (i = 0; i < mbedtls_rsa_get_len(&rsa); i++) { in main() 144 mbedtls_rsa_free(&rsa); in main()
|
| A D | rsa_genkey.c | 44 mbedtls_rsa_context rsa; in main() local 53 mbedtls_rsa_init(&rsa); in main() 72 if ((ret = mbedtls_rsa_gen_key(&rsa, mbedtls_ctr_drbg_random, &ctr_drbg, KEY_SIZE, in main() 81 if ((ret = mbedtls_rsa_export(&rsa, &N, &P, &Q, &D, &E)) != 0 || in main() 82 (ret = mbedtls_rsa_export_crt(&rsa, &DP, &DQ, &QP)) != 0) { in main() 134 mbedtls_rsa_free(&rsa); in main()
|
| A D | dh_server.c | 65 mbedtls_rsa_context rsa; in main() local 106 mbedtls_rsa_init(&rsa); in main() 120 if ((ret = mbedtls_rsa_import(&rsa, &N, &P, &Q, &D, &E)) != 0) { in main() 126 if ((ret = mbedtls_rsa_complete(&rsa)) != 0) { in main() 201 const size_t rsa_key_len = mbedtls_rsa_get_len(&rsa); in main() 205 if ((ret = mbedtls_rsa_pkcs1_sign(&rsa, mbedtls_ctr_drbg_random, &ctr_drbg, in main() 297 mbedtls_rsa_free(&rsa); in main()
|
| A D | dh_client.c | 73 mbedtls_rsa_context rsa; in main() local 110 mbedtls_rsa_init(&rsa); in main() 113 (ret = mbedtls_rsa_import(&rsa, &N, NULL, NULL, NULL, &E) != 0)) { in main() 184 if ((n = (size_t) (end - p)) != mbedtls_rsa_get_len(&rsa)) { in main() 200 if ((ret = mbedtls_rsa_pkcs1_verify(&rsa, MBEDTLS_MD_SHA256, in main() 277 mbedtls_rsa_free(&rsa); in main()
|
| A D | key_app.c | 267 mbedtls_rsa_context *rsa = mbedtls_pk_rsa(pk); in main() local 269 if ((ret = mbedtls_rsa_export(rsa, &N, &P, &Q, &D, &E)) != 0 || in main() 270 (ret = mbedtls_rsa_export_crt(rsa, &DP, &DQ, &QP)) != 0) { in main() 317 mbedtls_rsa_context *rsa = mbedtls_pk_rsa(pk); in main() local 319 if ((ret = mbedtls_rsa_export(rsa, &N, NULL, NULL, in main()
|
| A D | key_app_writer.c | 383 mbedtls_rsa_context *rsa = mbedtls_pk_rsa(key); in main() local 385 if ((ret = mbedtls_rsa_export(rsa, &N, &P, &Q, &D, &E)) != 0 || in main() 386 (ret = mbedtls_rsa_export_crt(rsa, &DP, &DQ, &QP)) != 0) { in main() 435 mbedtls_rsa_context *rsa = mbedtls_pk_rsa(key); in main() local 437 if ((ret = mbedtls_rsa_export(rsa, &N, NULL, NULL, in main()
|
| A D | gen_key.c | 410 mbedtls_rsa_context *rsa = mbedtls_pk_rsa(key); in main() local 412 if ((ret = mbedtls_rsa_export(rsa, &N, &P, &Q, &D, &E)) != 0 || in main() 413 (ret = mbedtls_rsa_export_crt(rsa, &DP, &DQ, &QP)) != 0) { in main()
|
| /mbedtls/tests/data_files/ |
| A D | Makefile | 334 cli-rsa-sha1.crt: cli-rsa.csr 337 cli-rsa-sha256.crt: cli-rsa.csr 341 cli-rsa-sha256.crt.der: cli-rsa-sha256.crt 345 parse_input/cli-rsa-sha256-badalg.crt.der: cli-rsa-sha256.crt.der 1880 cat pkcs7-rsa-sha256-1.crt pkcs7-rsa-sha256-1.key > pkcs7-rsa-sha256-1.pem 1885 cat pkcs7-rsa-sha256-2.crt pkcs7-rsa-sha256-2.key > pkcs7-rsa-sha256-2.pem 1890 cat pkcs7-rsa-sha256-3.crt pkcs7-rsa-sha256-3.key > pkcs7-rsa-sha256-3.pem 1893 pkcs7-rsa-expired.crt: 1911 pkcs7-rsa-expired.der: pkcs7-rsa-expired.crt 2108 cli-rsa.key \ [all …]
|
| A D | .gitignore | 1 cli-rsa.csr 2 server2-rsa.csr
|
| A D | Readme-x509.txt | 60 - cli-rsa.key, cli-rsa-*.crt: RSA key used for test clients, signed by 117 - crl-rsa-pss-*.pem: (1) server9{,badsign,with-ca}.crt + cert_sha384.crt + unknown 122 rsa = crl.pem, rsabadpem = same with pem error, rsaexp = crl_expired.pem 125 crl-rsa-pss* would revoke server6.crt if signed by CA 2
|
| A D | cli.opensslconf | 1 [cli-rsa]
|
| /mbedtls/programs/fuzz/ |
| A D | fuzz_pubkey.c | 23 mbedtls_rsa_context *rsa; in LLVMFuzzerTestOneInput() local 29 rsa = mbedtls_pk_rsa(pk); in LLVMFuzzerTestOneInput() 30 if (mbedtls_rsa_export(rsa, &N, NULL, NULL, NULL, &E) != 0) { in LLVMFuzzerTestOneInput() 33 if (mbedtls_rsa_export(rsa, &N, &P, &Q, &D, &E) != MBEDTLS_ERR_RSA_BAD_INPUT_DATA) { in LLVMFuzzerTestOneInput() 36 if (mbedtls_rsa_export_crt(rsa, &DP, &DQ, &QP) != MBEDTLS_ERR_RSA_BAD_INPUT_DATA) { in LLVMFuzzerTestOneInput()
|
| A D | fuzz_privkey.c | 51 mbedtls_rsa_context *rsa; in LLVMFuzzerTestOneInput() local 57 rsa = mbedtls_pk_rsa(pk); in LLVMFuzzerTestOneInput() 58 if (mbedtls_rsa_export(rsa, &N, &P, &Q, &D, &E) != 0) { in LLVMFuzzerTestOneInput() 61 if (mbedtls_rsa_export_crt(rsa, &DP, &DQ, &QP) != 0) { in LLVMFuzzerTestOneInput()
|
| /mbedtls/tests/suites/ |
| A D | test_suite_pkparse.function | 121 mbedtls_rsa_context *rsa; 123 rsa = mbedtls_pk_rsa(ctx); 124 TEST_EQUAL(mbedtls_rsa_check_privkey(rsa), 0); 126 size_t bitlen = mbedtls_rsa_get_bitlen(rsa); 162 mbedtls_rsa_context *rsa; 164 rsa = mbedtls_pk_rsa(ctx); 165 TEST_EQUAL(mbedtls_rsa_check_pubkey(rsa), 0); 167 size_t bitlen = mbedtls_rsa_get_bitlen(rsa);
|
| A D | test_suite_pk.function | 11 #include "mbedtls/rsa.h" 1089 mbedtls_rsa_context *rsa; 1105 rsa = mbedtls_pk_rsa(pk); 1107 rsa->len = (mod + 7) / 8; 1161 mbedtls_rsa_context *rsa; 1171 rsa = mbedtls_pk_rsa(pk); 1173 rsa->len = (mod + 7) / 8; 1445 mbedtls_rsa_context *rsa; 1459 /* init pk-rsa context */ 1461 rsa = mbedtls_pk_rsa(pk); [all …]
|
| /mbedtls/programs/test/ |
| A D | benchmark.c | 513 rsa, dhm, ecdsa, ecdh; member 599 todo.rsa = 1; in main() 1044 if (todo.rsa) { in main() 1046 mbedtls_rsa_context rsa; in main() local 1051 mbedtls_rsa_init(&rsa); in main() 1052 mbedtls_rsa_gen_key(&rsa, myrand, NULL, keysize, 65537); in main() 1056 ret = mbedtls_rsa_public(&rsa, buf, buf)); in main() 1060 ret = mbedtls_rsa_private(&rsa, myrand, NULL, buf, buf)); in main() 1062 mbedtls_rsa_free(&rsa); in main()
|
| /mbedtls/docs/architecture/psa-migration/ |
| A D | psa-limitations.md | 261 crl-rsa-pss-sha1-badsign.pem 265 crl-rsa-pss-sha1.pem 269 crl-rsa-pss-sha224.pem 273 crl-rsa-pss-sha256.pem 277 crl-rsa-pss-sha384.pem 281 crl-rsa-pss-sha512.pem
|