Home
last modified time | relevance | path

Searched refs:rsa (Results 1 – 25 of 43) sorted by relevance

12

/mbedtls/library/
A Dpsa_crypto_rsa.c140 mbedtls_rsa_free(rsa); in mbedtls_psa_rsa_import_key()
141 mbedtls_free(rsa); in mbedtls_psa_rsa_import_key()
210 mbedtls_rsa_free(rsa); in mbedtls_psa_rsa_export_public_key()
211 mbedtls_free(rsa); in mbedtls_psa_rsa_export_public_key()
260 mbedtls_rsa_init(&rsa); in mbedtls_psa_rsa_generate_key()
273 mbedtls_rsa_free(&rsa); in mbedtls_psa_rsa_generate_key()
387 mbedtls_rsa_free(rsa); in mbedtls_psa_rsa_sign_hash()
388 mbedtls_free(rsa); in mbedtls_psa_rsa_sign_hash()
486 mbedtls_rsa_free(rsa); in mbedtls_psa_rsa_verify_hash()
487 mbedtls_free(rsa); in mbedtls_psa_rsa_verify_hash()
[all …]
A Dpk_wrap.c61 return mbedtls_rsa_get_bitlen(rsa); in rsa_get_bitlen()
78 size_t rsa_len = mbedtls_rsa_get_len(rsa); in rsa_verify_wrap()
136 size_t rsa_len = mbedtls_rsa_get_len(rsa); in rsa_verify_wrap()
267 *sig_len = mbedtls_rsa_get_len(rsa); in rsa_sign_wrap()
297 if (ilen != mbedtls_rsa_get_len(rsa)) { in rsa_decrypt_wrap()
301 key_len = mbedtls_rsa_write_key(rsa, buf, &p); in rsa_decrypt_wrap()
352 if (ilen != mbedtls_rsa_get_len(rsa)) { in rsa_decrypt_wrap()
380 if (mbedtls_rsa_get_len(rsa) > osize) { in rsa_encrypt_wrap()
433 *olen = mbedtls_rsa_get_len(rsa); in rsa_encrypt_wrap()
482 items->value = &(rsa->N); in rsa_debug()
[all …]
A Drsa_internal.h34 int mbedtls_rsa_parse_key(mbedtls_rsa_context *rsa, const unsigned char *key, size_t keylen);
50 int mbedtls_rsa_parse_pubkey(mbedtls_rsa_context *rsa, const unsigned char *key, size_t keylen);
72 int mbedtls_rsa_write_key(const mbedtls_rsa_context *rsa, unsigned char *start,
95 int mbedtls_rsa_write_pubkey(const mbedtls_rsa_context *rsa, unsigned char *start,
A Drsa.c125 (ret = mbedtls_rsa_import(rsa, &T, NULL, NULL, in mbedtls_rsa_parse_key()
206 if ((ret = mbedtls_rsa_complete(rsa)) != 0 || in mbedtls_rsa_parse_key()
220 mbedtls_rsa_free(rsa); in mbedtls_rsa_parse_key()
273 if (mbedtls_rsa_complete(rsa) != 0 || in mbedtls_rsa_parse_pubkey()
274 mbedtls_rsa_check_pubkey(rsa) != 0) { in mbedtls_rsa_parse_pubkey()
2921 mbedtls_rsa_context rsa; in mbedtls_rsa_self_test() local
2932 mbedtls_rsa_init(&rsa); in mbedtls_rsa_self_test()
2945 MBEDTLS_MPI_CHK(mbedtls_rsa_complete(&rsa)); in mbedtls_rsa_self_test()
2951 if (mbedtls_rsa_check_pubkey(&rsa) != 0 || in mbedtls_rsa_self_test()
2952 mbedtls_rsa_check_privkey(&rsa) != 0) { in mbedtls_rsa_self_test()
[all …]
A Dpk.c384 static psa_algorithm_t psa_algorithm_for_rsa(const mbedtls_rsa_context *rsa, in psa_algorithm_for_rsa() argument
387 if (mbedtls_rsa_get_padding_mode(rsa) == MBEDTLS_RSA_PKCS_V21) { in psa_algorithm_for_rsa()
389 mbedtls_md_type_t md_type = (mbedtls_md_type_t) mbedtls_rsa_get_md_alg(rsa); in psa_algorithm_for_rsa()
445 mbedtls_rsa_context *rsa = mbedtls_pk_rsa(*pk); in mbedtls_pk_get_psa_attributes() local
446 int has_private = (mbedtls_rsa_check_privkey(rsa) == 0); in mbedtls_pk_get_psa_attributes()
455 psa_algorithm_for_rsa(rsa, want_crypt)); in mbedtls_pk_get_psa_attributes()
/mbedtls/programs/pkey/
A Drsa_sign.c38 mbedtls_rsa_context rsa; in main() local
44 mbedtls_rsa_init(&rsa); in main()
83 if ((ret = mbedtls_rsa_import(&rsa, &N, &P, &Q, &D, &E)) != 0) { in main()
89 if ((ret = mbedtls_rsa_complete(&rsa)) != 0) { in main()
97 if ((ret = mbedtls_rsa_check_privkey(&rsa)) != 0) { in main()
117 if ((ret = mbedtls_rsa_pkcs1_sign(&rsa, NULL, NULL, MBEDTLS_MD_SHA256, in main()
134 for (i = 0; i < mbedtls_rsa_get_len(&rsa); i++) { in main()
147 mbedtls_rsa_free(&rsa); in main()
A Drsa_verify.c39 mbedtls_rsa_context rsa; in main() local
45 mbedtls_rsa_init(&rsa); in main()
70 (ret = mbedtls_rsa_import(&rsa, &N, NULL, NULL, NULL, &E) != 0)) { in main()
95 if (i != mbedtls_rsa_get_len(&rsa)) { in main()
114 if ((ret = mbedtls_rsa_pkcs1_verify(&rsa, MBEDTLS_MD_SHA256, in main()
127 mbedtls_rsa_free(&rsa); in main()
A Drsa_decrypt.c43 mbedtls_rsa_context rsa; in main() local
67 mbedtls_rsa_init(&rsa); in main()
107 if ((ret = mbedtls_rsa_import(&rsa, &N, &P, &Q, &D, &E)) != 0) { in main()
113 if ((ret = mbedtls_rsa_complete(&rsa)) != 0) { in main()
136 if (i != mbedtls_rsa_get_len(&rsa)) { in main()
147 ret = mbedtls_rsa_pkcs1_decrypt(&rsa, mbedtls_ctr_drbg_random, in main()
165 mbedtls_rsa_free(&rsa); in main()
A Drsa_encrypt.c41 mbedtls_rsa_context rsa; in main() local
63 mbedtls_rsa_init(&rsa); in main()
94 if ((ret = mbedtls_rsa_import(&rsa, &N, NULL, NULL, NULL, &E)) != 0) { in main()
113 ret = mbedtls_rsa_pkcs1_encrypt(&rsa, mbedtls_ctr_drbg_random, in main()
129 for (i = 0; i < mbedtls_rsa_get_len(&rsa); i++) { in main()
144 mbedtls_rsa_free(&rsa); in main()
A Drsa_genkey.c44 mbedtls_rsa_context rsa; in main() local
53 mbedtls_rsa_init(&rsa); in main()
72 if ((ret = mbedtls_rsa_gen_key(&rsa, mbedtls_ctr_drbg_random, &ctr_drbg, KEY_SIZE, in main()
81 if ((ret = mbedtls_rsa_export(&rsa, &N, &P, &Q, &D, &E)) != 0 || in main()
82 (ret = mbedtls_rsa_export_crt(&rsa, &DP, &DQ, &QP)) != 0) { in main()
134 mbedtls_rsa_free(&rsa); in main()
A Ddh_server.c65 mbedtls_rsa_context rsa; in main() local
106 mbedtls_rsa_init(&rsa); in main()
120 if ((ret = mbedtls_rsa_import(&rsa, &N, &P, &Q, &D, &E)) != 0) { in main()
126 if ((ret = mbedtls_rsa_complete(&rsa)) != 0) { in main()
201 const size_t rsa_key_len = mbedtls_rsa_get_len(&rsa); in main()
205 if ((ret = mbedtls_rsa_pkcs1_sign(&rsa, mbedtls_ctr_drbg_random, &ctr_drbg, in main()
297 mbedtls_rsa_free(&rsa); in main()
A Ddh_client.c73 mbedtls_rsa_context rsa; in main() local
110 mbedtls_rsa_init(&rsa); in main()
113 (ret = mbedtls_rsa_import(&rsa, &N, NULL, NULL, NULL, &E) != 0)) { in main()
184 if ((n = (size_t) (end - p)) != mbedtls_rsa_get_len(&rsa)) { in main()
200 if ((ret = mbedtls_rsa_pkcs1_verify(&rsa, MBEDTLS_MD_SHA256, in main()
277 mbedtls_rsa_free(&rsa); in main()
A Dkey_app.c267 mbedtls_rsa_context *rsa = mbedtls_pk_rsa(pk); in main() local
269 if ((ret = mbedtls_rsa_export(rsa, &N, &P, &Q, &D, &E)) != 0 || in main()
270 (ret = mbedtls_rsa_export_crt(rsa, &DP, &DQ, &QP)) != 0) { in main()
317 mbedtls_rsa_context *rsa = mbedtls_pk_rsa(pk); in main() local
319 if ((ret = mbedtls_rsa_export(rsa, &N, NULL, NULL, in main()
A Dkey_app_writer.c383 mbedtls_rsa_context *rsa = mbedtls_pk_rsa(key); in main() local
385 if ((ret = mbedtls_rsa_export(rsa, &N, &P, &Q, &D, &E)) != 0 || in main()
386 (ret = mbedtls_rsa_export_crt(rsa, &DP, &DQ, &QP)) != 0) { in main()
435 mbedtls_rsa_context *rsa = mbedtls_pk_rsa(key); in main() local
437 if ((ret = mbedtls_rsa_export(rsa, &N, NULL, NULL, in main()
A Dgen_key.c410 mbedtls_rsa_context *rsa = mbedtls_pk_rsa(key); in main() local
412 if ((ret = mbedtls_rsa_export(rsa, &N, &P, &Q, &D, &E)) != 0 || in main()
413 (ret = mbedtls_rsa_export_crt(rsa, &DP, &DQ, &QP)) != 0) { in main()
/mbedtls/tests/data_files/
A DMakefile334 cli-rsa-sha1.crt: cli-rsa.csr
337 cli-rsa-sha256.crt: cli-rsa.csr
341 cli-rsa-sha256.crt.der: cli-rsa-sha256.crt
345 parse_input/cli-rsa-sha256-badalg.crt.der: cli-rsa-sha256.crt.der
1880 cat pkcs7-rsa-sha256-1.crt pkcs7-rsa-sha256-1.key > pkcs7-rsa-sha256-1.pem
1885 cat pkcs7-rsa-sha256-2.crt pkcs7-rsa-sha256-2.key > pkcs7-rsa-sha256-2.pem
1890 cat pkcs7-rsa-sha256-3.crt pkcs7-rsa-sha256-3.key > pkcs7-rsa-sha256-3.pem
1893 pkcs7-rsa-expired.crt:
1911 pkcs7-rsa-expired.der: pkcs7-rsa-expired.crt
2108 cli-rsa.key \
[all …]
A D.gitignore1 cli-rsa.csr
2 server2-rsa.csr
A DReadme-x509.txt60 - cli-rsa.key, cli-rsa-*.crt: RSA key used for test clients, signed by
117 - crl-rsa-pss-*.pem: (1) server9{,badsign,with-ca}.crt + cert_sha384.crt + unknown
122 rsa = crl.pem, rsabadpem = same with pem error, rsaexp = crl_expired.pem
125 crl-rsa-pss* would revoke server6.crt if signed by CA 2
A Dcli.opensslconf1 [cli-rsa]
/mbedtls/programs/fuzz/
A Dfuzz_pubkey.c23 mbedtls_rsa_context *rsa; in LLVMFuzzerTestOneInput() local
29 rsa = mbedtls_pk_rsa(pk); in LLVMFuzzerTestOneInput()
30 if (mbedtls_rsa_export(rsa, &N, NULL, NULL, NULL, &E) != 0) { in LLVMFuzzerTestOneInput()
33 if (mbedtls_rsa_export(rsa, &N, &P, &Q, &D, &E) != MBEDTLS_ERR_RSA_BAD_INPUT_DATA) { in LLVMFuzzerTestOneInput()
36 if (mbedtls_rsa_export_crt(rsa, &DP, &DQ, &QP) != MBEDTLS_ERR_RSA_BAD_INPUT_DATA) { in LLVMFuzzerTestOneInput()
A Dfuzz_privkey.c51 mbedtls_rsa_context *rsa; in LLVMFuzzerTestOneInput() local
57 rsa = mbedtls_pk_rsa(pk); in LLVMFuzzerTestOneInput()
58 if (mbedtls_rsa_export(rsa, &N, &P, &Q, &D, &E) != 0) { in LLVMFuzzerTestOneInput()
61 if (mbedtls_rsa_export_crt(rsa, &DP, &DQ, &QP) != 0) { in LLVMFuzzerTestOneInput()
/mbedtls/tests/suites/
A Dtest_suite_pkparse.function121 mbedtls_rsa_context *rsa;
123 rsa = mbedtls_pk_rsa(ctx);
124 TEST_EQUAL(mbedtls_rsa_check_privkey(rsa), 0);
126 size_t bitlen = mbedtls_rsa_get_bitlen(rsa);
162 mbedtls_rsa_context *rsa;
164 rsa = mbedtls_pk_rsa(ctx);
165 TEST_EQUAL(mbedtls_rsa_check_pubkey(rsa), 0);
167 size_t bitlen = mbedtls_rsa_get_bitlen(rsa);
A Dtest_suite_pk.function11 #include "mbedtls/rsa.h"
1089 mbedtls_rsa_context *rsa;
1105 rsa = mbedtls_pk_rsa(pk);
1107 rsa->len = (mod + 7) / 8;
1161 mbedtls_rsa_context *rsa;
1171 rsa = mbedtls_pk_rsa(pk);
1173 rsa->len = (mod + 7) / 8;
1445 mbedtls_rsa_context *rsa;
1459 /* init pk-rsa context */
1461 rsa = mbedtls_pk_rsa(pk);
[all …]
/mbedtls/programs/test/
A Dbenchmark.c513 rsa, dhm, ecdsa, ecdh; member
599 todo.rsa = 1; in main()
1044 if (todo.rsa) { in main()
1046 mbedtls_rsa_context rsa; in main() local
1051 mbedtls_rsa_init(&rsa); in main()
1052 mbedtls_rsa_gen_key(&rsa, myrand, NULL, keysize, 65537); in main()
1056 ret = mbedtls_rsa_public(&rsa, buf, buf)); in main()
1060 ret = mbedtls_rsa_private(&rsa, myrand, NULL, buf, buf)); in main()
1062 mbedtls_rsa_free(&rsa); in main()
/mbedtls/docs/architecture/psa-migration/
A Dpsa-limitations.md261 crl-rsa-pss-sha1-badsign.pem
265 crl-rsa-pss-sha1.pem
269 crl-rsa-pss-sha224.pem
273 crl-rsa-pss-sha256.pem
277 crl-rsa-pss-sha384.pem
281 crl-rsa-pss-sha512.pem

Completed in 51 milliseconds

12