/system/core/adb/ |
adb_auth_host.c | 37 #include "mincrypt/rsa.h" 45 #include <openssl/rsa.h> 56 RSA *rsa; member in struct:adb_private_key 62 /* Convert OpenSSL RSA private key to android pre-computed RSAPublicKey format */ 63 static int RSA_to_RSAPublicKey(RSA *rsa, RSAPublicKey *pkey) 76 if (RSA_size(rsa) != RSANUMBYTES) { 82 BN_copy(n, rsa->n); 96 pkey->exponent = BN_get_word(rsa->e) 178 RSA* rsa = RSA_new(); local [all...] |
/external/openssl/crypto/pem/ |
pvkfmt.c | 68 #include <openssl/rsa.h> 114 /* Convert private key blob to EVP_PKEY: RSA and DSA keys supported */ 375 RSA *rsa = NULL; local 379 rsa = RSA_new(); 381 if (!rsa || !ret) 383 rsa->e = BN_new(); 384 if (!rsa->e) 386 if (!BN_set_word(rsa->e, read_ledword(&p))) 388 if (!read_lebn(&p, nbyte, &rsa->n) [all...] |
/external/openssl/ssl/ |
d1_clnt.c | 68 * apply to all code found in this distribution, be it the RC4, RSA, 988 RSA *rsa; local 992 rsa=s->session->sess_cert->peer_rsa_tmp; 998 (pkey->pkey.rsa == NULL)) 1003 rsa=pkey->pkey.rsa; 1019 tmp_buf,p,rsa,RSA_PKCS1_PADDING); [all...] |
d1_srvr.c | 68 * apply to all code found in this distribution, be it the RC4, RSA, 459 /* option SSL_OP_EPHEMERAL_RSA sends temporary RSA key 468 * RSA but we have a sign only certificate */ 1027 RSA *rsa; local 1065 rsa=cert->rsa_tmp; 1066 if ((rsa == NULL) && (s->cert->rsa_tmp_cb != NULL)) 1068 rsa=s->cert->rsa_tmp_cb(s, 1071 if(rsa == NULL) 1077 RSA_up_ref(rsa); [all...] |
s3_clnt.c | 11 * apply to all code found in this distribution, be it the RC4, RSA, 748 * used in RSA encrypted premaster secrets. Some servers can 758 * 3. RSA encrypted premaster secret uses 1.2. 763 * 7. Server chokes on RSA encrypted premaster secret 1330 RSA *rsa=NULL; local 2307 RSA *rsa; local 3227 RSA *rsa; local [all...] |
s3_srvr.c | 11 * apply to all code found in this distribution, be it the RC4, RSA, 449 /* option SSL_OP_EPHEMERAL_RSA sends temporary RSA key 459 * RSA but we have a sign only certificate 1559 RSA *rsa; local 2131 RSA *rsa=NULL; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
crypto_cryptoapi.c | 25 L"Microsoft Enhanced RSA and AES Cryptographic Provider (Prototype)" 28 "Microsoft Enhanced RSA and AES Cryptographic Provider (Prototype)" 643 HCRYPTKEY rsa; member in struct:crypto_public_key 648 HCRYPTKEY rsa; member in struct:crypto_private_key 696 &pk->rsa)) { 726 if (!CryptEncrypt(key->rsa, 0, TRUE, 0, tmp, &clen, *outlen)) { 757 CryptDestroyKey(key->rsa); 767 CryptDestroyKey(key->rsa);
|
crypto_libtomcrypt.c | 415 rsa_key rsa; member in struct:crypto_public_key 419 rsa_key rsa; member in struct:crypto_private_key 432 res = rsa_import(key, len, &pk->rsa); 441 if (pk->rsa.type != PK_PUBLIC) { 444 rsa_free(&pk->rsa); 463 res = rsa_import(key, len, &pk->rsa); 472 if (pk->rsa.type != PK_PRIVATE) { 475 rsa_free(&pk->rsa); 585 return crypto_rsa_encrypt_pkcs1(2, &key->rsa, PK_PUBLIC, in, inlen, 594 return crypto_rsa_encrypt_pkcs1(1, &key->rsa, PK_PRIVATE, in, inlen [all...] |
tls_openssl.c | 150 unsigned char *to, RSA *rsa, int padding) 158 unsigned char *to, RSA *rsa, int padding) 166 unsigned char *to, RSA *rsa, int padding) 169 (struct cryptoapi_rsa_data *) rsa->meth->app_data; 220 len = RSA_size(rsa); 245 unsigned char *to, RSA *rsa, int padding 322 RSA *rsa = NULL, *pub_rsa; local [all...] |
/external/wpa_supplicant_8/src/crypto/ |
crypto_cryptoapi.c | 19 L"Microsoft Enhanced RSA and AES Cryptographic Provider (Prototype)" 22 "Microsoft Enhanced RSA and AES Cryptographic Provider (Prototype)" 633 HCRYPTKEY rsa; member in struct:crypto_public_key 638 HCRYPTKEY rsa; member in struct:crypto_private_key 687 &pk->rsa)) { 717 if (!CryptEncrypt(key->rsa, 0, TRUE, 0, tmp, &clen, *outlen)) { 748 CryptDestroyKey(key->rsa); 758 CryptDestroyKey(key->rsa);
|
crypto_libtomcrypt.c | 408 rsa_key rsa; member in struct:crypto_public_key 412 rsa_key rsa; member in struct:crypto_private_key 425 res = rsa_import(key, len, &pk->rsa); 434 if (pk->rsa.type != PK_PUBLIC) { 437 rsa_free(&pk->rsa); 457 res = rsa_import(key, len, &pk->rsa); 466 if (pk->rsa.type != PK_PRIVATE) { 469 rsa_free(&pk->rsa); 579 return crypto_rsa_encrypt_pkcs1(2, &key->rsa, PK_PUBLIC, in, inlen, 588 return crypto_rsa_encrypt_pkcs1(1, &key->rsa, PK_PRIVATE, in, inlen [all...] |
tls_openssl.c | 154 unsigned char *to, RSA *rsa, int padding) 162 unsigned char *to, RSA *rsa, int padding) 170 unsigned char *to, RSA *rsa, int padding) 173 (struct cryptoapi_rsa_data *) rsa->meth->app_data; 224 len = RSA_size(rsa); 249 unsigned char *to, RSA *rsa, int padding 326 RSA *rsa = NULL, *pub_rsa; local [all...] |
/external/openssh/ |
ssh-keyscan.c | 60 int get_keytypes = KT_RSA; /* Get only RSA keys by default */ 187 static Key *rsa; local 190 if (rsa == NULL) { 192 rsa = key_new(KEY_RSA1); 205 buffer_get_bignum(&msg, rsa->rsa->e); 206 buffer_get_bignum(&msg, rsa->rsa->n); 210 buffer_get_bignum(&msg, rsa->rsa->e) [all...] |
key.c | 51 #include "rsa.h" 77 RSA *rsa; local 84 k->rsa = NULL; 91 if ((rsa = RSA_new()) == NULL) 93 if ((rsa->n = BN_new()) == NULL) 95 if ((rsa->e = BN_new()) == NULL) 97 k->rsa = rsa; 141 if ((k->rsa->d = BN_new()) == NULL [all...] |
ssh-keygen.c | 41 #include "rsa.h" 54 /* Number of bits in the RSA/DSA key. This value can be set on the command line. */ 292 if (!PEM_write_RSA_PUBKEY(stdout, k->rsa)) 316 if (!PEM_write_RSAPublicKey(stdout, k->rsa)) 421 } else if (strstr(type, "rsa")) { 450 if (!BN_set_word(key->rsa->e, e)) { 455 buffer_get_bignum_bits(&b, key->rsa->d); 456 buffer_get_bignum_bits(&b, key->rsa->n); 457 buffer_get_bignum_bits(&b, key->rsa->iqmp); 458 buffer_get_bignum_bits(&b, key->rsa->q) 605 RSA *rsa; local [all...] |
/external/ipsec-tools/src/racoon/ |
handler.h | 38 #include <openssl/rsa.h> 167 RSA *rsa; /* my RSA key */ member in struct:ph1handle 168 RSA *rsa_p; /* peer's RSA key */ 169 struct genlist *rsa_candidates; /* possible candidates for peer's RSA key */
|
/external/openssl/apps/ |
apps.c | 11 * apply to all code found in this distribution, be it the RC4, RSA, 139 #include <openssl/rsa.h> 1016 RSA *rsa; local 1017 rsa = d2i_RSAPublicKey_bio(key, NULL); 1018 if (rsa) 1022 EVP_PKEY_set1_RSA(pkey, rsa); 1023 RSA_free(rsa); 1030 RSA *rsa; local 1076 RSA *rsa; local [all...] |
s_server.c | 11 * apply to all code found in this distribution, be it the RC4, RSA, 187 #include <openssl/rsa.h> 205 static RSA MS_CALLBACK *tmp_rsa_cb(SSL *s, int is_export, int keylength); 504 BIO_printf(bio_err," -no_tmp_rsa - Do not generate a tmp RSA key\n"); 1758 RSA *rsa; local [all...] |
/external/openssl/crypto/evp/ |
evp.h | 11 * apply to all code found in this distribution, be it the RC4, RSA, 138 struct rsa_st *rsa; /* RSA */ member in union:evp_pkey_st::__anon11372 296 #define EVP_MD_CTX_FLAG_PAD_MASK 0xF0 /* RSA mode to use */ 452 #define EVP_PKEY_assign_RSA(pkey,rsa) EVP_PKEY_assign((pkey),EVP_PKEY_RSA,\ 453 (char *)(rsa)) [all...] |
/external/openssl/include/openssl/ |
evp.h | 11 * apply to all code found in this distribution, be it the RC4, RSA, 138 struct rsa_st *rsa; /* RSA */ member in union:evp_pkey_st::__anon11453 296 #define EVP_MD_CTX_FLAG_PAD_MASK 0xF0 /* RSA mode to use */ 452 #define EVP_PKEY_assign_RSA(pkey,rsa) EVP_PKEY_assign((pkey),EVP_PKEY_RSA,\ 453 (char *)(rsa)) [all...] |
/tools/motodev/src/plugins/certmanager/lib/ |
bcprov-jdk15on-147.jar | |
/prebuilts/sdk/tools/lib/ |
signapk.jar | |