HomeSort by relevance Sort by last modified time
    Searched defs:rsa (Results 26 - 47 of 47) sorted by null

12

  /system/core/adb/
adb_auth_host.c 37 #include "mincrypt/rsa.h"
45 #include <openssl/rsa.h>
56 RSA *rsa; member in struct:adb_private_key
62 /* Convert OpenSSL RSA private key to android pre-computed RSAPublicKey format */
63 static int RSA_to_RSAPublicKey(RSA *rsa, RSAPublicKey *pkey)
76 if (RSA_size(rsa) != RSANUMBYTES) {
82 BN_copy(n, rsa->n);
96 pkey->exponent = BN_get_word(rsa->e)
178 RSA* rsa = RSA_new(); local
    [all...]
  /external/openssl/crypto/pem/
pvkfmt.c 68 #include <openssl/rsa.h>
114 /* Convert private key blob to EVP_PKEY: RSA and DSA keys supported */
375 RSA *rsa = NULL; local
379 rsa = RSA_new();
381 if (!rsa || !ret)
383 rsa->e = BN_new();
384 if (!rsa->e)
386 if (!BN_set_word(rsa->e, read_ledword(&p)))
388 if (!read_lebn(&p, nbyte, &rsa->n)
    [all...]
  /external/openssl/ssl/
d1_clnt.c 68 * apply to all code found in this distribution, be it the RC4, RSA,
988 RSA *rsa; local
992 rsa=s->session->sess_cert->peer_rsa_tmp;
998 (pkey->pkey.rsa == NULL))
1003 rsa=pkey->pkey.rsa;
1019 tmp_buf,p,rsa,RSA_PKCS1_PADDING);
    [all...]
d1_srvr.c 68 * apply to all code found in this distribution, be it the RC4, RSA,
459 /* option SSL_OP_EPHEMERAL_RSA sends temporary RSA key
468 * RSA but we have a sign only certificate */
1027 RSA *rsa; local
1065 rsa=cert->rsa_tmp;
1066 if ((rsa == NULL) && (s->cert->rsa_tmp_cb != NULL))
1068 rsa=s->cert->rsa_tmp_cb(s,
1071 if(rsa == NULL)
1077 RSA_up_ref(rsa);
    [all...]
s3_clnt.c 11 * apply to all code found in this distribution, be it the RC4, RSA,
748 * used in RSA encrypted premaster secrets. Some servers can
758 * 3. RSA encrypted premaster secret uses 1.2.
763 * 7. Server chokes on RSA encrypted premaster secret
1330 RSA *rsa=NULL; local
2307 RSA *rsa; local
3227 RSA *rsa; local
    [all...]
s3_srvr.c 11 * apply to all code found in this distribution, be it the RC4, RSA,
449 /* option SSL_OP_EPHEMERAL_RSA sends temporary RSA key
459 * RSA but we have a sign only certificate
1559 RSA *rsa; local
2131 RSA *rsa=NULL; local
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/crypto/
crypto_cryptoapi.c 25 L"Microsoft Enhanced RSA and AES Cryptographic Provider (Prototype)"
28 "Microsoft Enhanced RSA and AES Cryptographic Provider (Prototype)"
643 HCRYPTKEY rsa; member in struct:crypto_public_key
648 HCRYPTKEY rsa; member in struct:crypto_private_key
696 &pk->rsa)) {
726 if (!CryptEncrypt(key->rsa, 0, TRUE, 0, tmp, &clen, *outlen)) {
757 CryptDestroyKey(key->rsa);
767 CryptDestroyKey(key->rsa);
crypto_libtomcrypt.c 415 rsa_key rsa; member in struct:crypto_public_key
419 rsa_key rsa; member in struct:crypto_private_key
432 res = rsa_import(key, len, &pk->rsa);
441 if (pk->rsa.type != PK_PUBLIC) {
444 rsa_free(&pk->rsa);
463 res = rsa_import(key, len, &pk->rsa);
472 if (pk->rsa.type != PK_PRIVATE) {
475 rsa_free(&pk->rsa);
585 return crypto_rsa_encrypt_pkcs1(2, &key->rsa, PK_PUBLIC, in, inlen,
594 return crypto_rsa_encrypt_pkcs1(1, &key->rsa, PK_PRIVATE, in, inlen
    [all...]
tls_openssl.c 150 unsigned char *to, RSA *rsa, int padding)
158 unsigned char *to, RSA *rsa, int padding)
166 unsigned char *to, RSA *rsa, int padding)
169 (struct cryptoapi_rsa_data *) rsa->meth->app_data;
220 len = RSA_size(rsa);
245 unsigned char *to, RSA *rsa, int padding
322 RSA *rsa = NULL, *pub_rsa; local
    [all...]
  /external/wpa_supplicant_8/src/crypto/
crypto_cryptoapi.c 19 L"Microsoft Enhanced RSA and AES Cryptographic Provider (Prototype)"
22 "Microsoft Enhanced RSA and AES Cryptographic Provider (Prototype)"
633 HCRYPTKEY rsa; member in struct:crypto_public_key
638 HCRYPTKEY rsa; member in struct:crypto_private_key
687 &pk->rsa)) {
717 if (!CryptEncrypt(key->rsa, 0, TRUE, 0, tmp, &clen, *outlen)) {
748 CryptDestroyKey(key->rsa);
758 CryptDestroyKey(key->rsa);
crypto_libtomcrypt.c 408 rsa_key rsa; member in struct:crypto_public_key
412 rsa_key rsa; member in struct:crypto_private_key
425 res = rsa_import(key, len, &pk->rsa);
434 if (pk->rsa.type != PK_PUBLIC) {
437 rsa_free(&pk->rsa);
457 res = rsa_import(key, len, &pk->rsa);
466 if (pk->rsa.type != PK_PRIVATE) {
469 rsa_free(&pk->rsa);
579 return crypto_rsa_encrypt_pkcs1(2, &key->rsa, PK_PUBLIC, in, inlen,
588 return crypto_rsa_encrypt_pkcs1(1, &key->rsa, PK_PRIVATE, in, inlen
    [all...]
tls_openssl.c 154 unsigned char *to, RSA *rsa, int padding)
162 unsigned char *to, RSA *rsa, int padding)
170 unsigned char *to, RSA *rsa, int padding)
173 (struct cryptoapi_rsa_data *) rsa->meth->app_data;
224 len = RSA_size(rsa);
249 unsigned char *to, RSA *rsa, int padding
326 RSA *rsa = NULL, *pub_rsa; local
    [all...]
  /external/openssh/
ssh-keyscan.c 60 int get_keytypes = KT_RSA; /* Get only RSA keys by default */
187 static Key *rsa; local
190 if (rsa == NULL) {
192 rsa = key_new(KEY_RSA1);
205 buffer_get_bignum(&msg, rsa->rsa->e);
206 buffer_get_bignum(&msg, rsa->rsa->n);
210 buffer_get_bignum(&msg, rsa->rsa->e)
    [all...]
key.c 51 #include "rsa.h"
77 RSA *rsa; local
84 k->rsa = NULL;
91 if ((rsa = RSA_new()) == NULL)
93 if ((rsa->n = BN_new()) == NULL)
95 if ((rsa->e = BN_new()) == NULL)
97 k->rsa = rsa;
141 if ((k->rsa->d = BN_new()) == NULL
    [all...]
ssh-keygen.c 41 #include "rsa.h"
54 /* Number of bits in the RSA/DSA key. This value can be set on the command line. */
292 if (!PEM_write_RSA_PUBKEY(stdout, k->rsa))
316 if (!PEM_write_RSAPublicKey(stdout, k->rsa))
421 } else if (strstr(type, "rsa")) {
450 if (!BN_set_word(key->rsa->e, e)) {
455 buffer_get_bignum_bits(&b, key->rsa->d);
456 buffer_get_bignum_bits(&b, key->rsa->n);
457 buffer_get_bignum_bits(&b, key->rsa->iqmp);
458 buffer_get_bignum_bits(&b, key->rsa->q)
605 RSA *rsa; local
    [all...]
  /external/ipsec-tools/src/racoon/
handler.h 38 #include <openssl/rsa.h>
167 RSA *rsa; /* my RSA key */ member in struct:ph1handle
168 RSA *rsa_p; /* peer's RSA key */
169 struct genlist *rsa_candidates; /* possible candidates for peer's RSA key */
  /external/openssl/apps/
apps.c 11 * apply to all code found in this distribution, be it the RC4, RSA,
139 #include <openssl/rsa.h>
1016 RSA *rsa; local
1017 rsa = d2i_RSAPublicKey_bio(key, NULL);
1018 if (rsa)
1022 EVP_PKEY_set1_RSA(pkey, rsa);
1023 RSA_free(rsa);
1030 RSA *rsa; local
1076 RSA *rsa; local
    [all...]
s_server.c 11 * apply to all code found in this distribution, be it the RC4, RSA,
187 #include <openssl/rsa.h>
205 static RSA MS_CALLBACK *tmp_rsa_cb(SSL *s, int is_export, int keylength);
504 BIO_printf(bio_err," -no_tmp_rsa - Do not generate a tmp RSA key\n");
1758 RSA *rsa; local
    [all...]
  /external/openssl/crypto/evp/
evp.h 11 * apply to all code found in this distribution, be it the RC4, RSA,
138 struct rsa_st *rsa; /* RSA */ member in union:evp_pkey_st::__anon11372
296 #define EVP_MD_CTX_FLAG_PAD_MASK 0xF0 /* RSA mode to use */
452 #define EVP_PKEY_assign_RSA(pkey,rsa) EVP_PKEY_assign((pkey),EVP_PKEY_RSA,\
453 (char *)(rsa))
    [all...]
  /external/openssl/include/openssl/
evp.h 11 * apply to all code found in this distribution, be it the RC4, RSA,
138 struct rsa_st *rsa; /* RSA */ member in union:evp_pkey_st::__anon11453
296 #define EVP_MD_CTX_FLAG_PAD_MASK 0xF0 /* RSA mode to use */
452 #define EVP_PKEY_assign_RSA(pkey,rsa) EVP_PKEY_assign((pkey),EVP_PKEY_RSA,\
453 (char *)(rsa))
    [all...]
  /tools/motodev/src/plugins/certmanager/lib/
bcprov-jdk15on-147.jar 
  /prebuilts/sdk/tools/lib/
signapk.jar 

Completed in 1208 milliseconds

12