/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/func/ |
CipherRSATest.java | 23 CipherRSAThread rsa = new CipherRSAThread("RSA", new int[] {512}, local 28 rsa.launcher(); 30 assertEquals(rsa.getFailureMessages(), 0, rsa.getTotalFailuresNumber()); 35 CipherRSAThread rsa = new CipherRSAThread("RSA", new int[] {1024}, local 40 rsa.launcher(); 42 assertEquals(rsa.getFailureMessages(), 0, rsa.getTotalFailuresNumber()) 47 CipherRSAThread rsa = new CipherRSAThread("RSA", new int[] {2048}, local 57 CipherRSAThread rsa = new CipherRSAThread("RSA", new int[] {1024}, local [all...] |
/external/openssl/crypto/rsa/ |
rsa_depr.c | 1 /* crypto/rsa/rsa_depr.c */ 63 #include <openssl/rsa.h> 71 RSA *RSA_generate_key(int bits, unsigned long e_value, 76 RSA *rsa = RSA_new(); local 79 if(!rsa || !e) goto err; 92 if(RSA_generate_key_ex(rsa, bits, e, &cb)) { 94 return rsa; 98 if(rsa) RSA_free(rsa); [all...] |
rsa_pmeth.c | 1 /* crypto/rsa/rsa_pmeth.c */ 63 #include <openssl/rsa.h> 75 /* RSA pkey context structure */ 84 /* RSA padding mode */ 169 RSA *rsa = ctx->pkey->pkey.rsa; local 173 if (rsa->flags & RSA_FLAG_NON_FIPS_ALLOW) 175 if (!(rsa->meth->flags & RSA_FLAG_FIPS_METHOD) && rv) 190 RSA *rsa = ctx->pkey->pkey.rsa local 344 RSA *rsa = ctx->pkey->pkey.rsa; local 658 RSA *rsa = NULL; local [all...] |
rsa_ameth.c | 1 /* crypto/rsa/rsa_ameth.c */ 63 #include <openssl/rsa.h> 74 penclen = i2d_RSAPublicKey(pkey->pkey.rsa, &penc); 89 RSA *rsa = NULL; local 92 if (!(rsa = d2i_RSAPublicKey(NULL, &p, pklen))) 97 EVP_PKEY_assign_RSA (pkey, rsa); 103 if (BN_cmp(b->pkey.rsa->n,a->pkey.rsa->n) != 0 104 || BN_cmp(b->pkey.rsa->e,a->pkey.rsa->e) != 0 112 RSA *rsa; local [all...] |
/external/ipsec-tools/src/racoon/ |
rsalist.h | 38 #include <openssl/rsa.h> 52 RSA *rsa; member in struct:rsa_key 55 int rsa_key_insert(struct genlist *list, struct netaddr *src, struct netaddr *dst, RSA *rsa); 59 RSA *rsa_try_check_rsasign(vchar_t *source, vchar_t *sig, struct genlist *list);
|
prsa_par.h | 96 RSA *rsa; member in union:YYSTYPE
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/rsa/ |
KeyFactorySpi.java | 1 package org.bouncycastle.jcajce.provider.asymmetric.rsa;
|
RSAUtil.java | 1 package org.bouncycastle.jcajce.provider.asymmetric.rsa; 14 * utility class for converting java.security RSA objects into their
|
KeyPairGeneratorSpi.java | 1 package org.bouncycastle.jcajce.provider.asymmetric.rsa; 33 super("RSA");
|
AlgorithmParametersSpi.java | 1 package org.bouncycastle.jcajce.provider.asymmetric.rsa;
|
BCRSAPublicKey.java | 1 package org.bouncycastle.jcajce.provider.asymmetric.rsa; 56 throw new IllegalArgumentException("invalid info structure in RSA public key"); 82 return "RSA"; 123 buf.append("RSA Public Key").append(nl);
|
BCRSAPrivateCrtKey.java | 1 package org.bouncycastle.jcajce.provider.asymmetric.rsa; 17 * A provider representation for a RSA private key, with CRT factors included. 87 * construct an RSA key from a private key info object. 97 * construct an RSA key from a ASN.1 RSA private key object. 229 buf.append("RSA Private CRT Key").append(nl);
|
BCRSAPrivateKey.java | 1 package org.bouncycastle.jcajce.provider.asymmetric.rsa; 70 return "RSA";
|
CipherSpi.java | 1 package org.bouncycastle.jcajce.provider.asymmetric.rsa; 104 throw new IllegalStateException("RSA Cipher not initialised"); 124 throw new IllegalArgumentException("not an RSA key!"); 136 throw new IllegalStateException("RSA Cipher not initialised"); 240 throw new NoSuchPaddingException(padding + " unavailable with RSA."); 277 throw new InvalidKeyException("unknown key type passed to RSA"); 344 throw new InvalidParameterException("unknown opmode " + opmode + " passed to RSA"); 401 throw new ArrayIndexOutOfBoundsException("too much data for RSA block"); 408 throw new ArrayIndexOutOfBoundsException("too much data for RSA block"); 428 throw new ArrayIndexOutOfBoundsException("too much data for RSA block") [all...] |
DigestSignatureSpi.java | 1 package org.bouncycastle.jcajce.provider.asymmetric.rsa; 257 // For raw RSA, the DigestInfo must be prepared externally
|
/external/openssl/apps/ |
genrsa.c | 11 * apply to all code found in this distribution, be it the RC4, RSA, 75 #include <openssl/rsa.h> 108 RSA *rsa = NULL; local 266 BIO_printf(bio_err,"Generating RSA private key, %d bit long modulus\n", 269 rsa = RSA_new(); 271 rsa = RSA_new_method(e); 273 if (!rsa) 276 if(!BN_set_word(bn, f4) || !RSA_generate_key_ex(rsa, num, bn, &cb)) 284 for (i=0; i<rsa->e->top; i++ [all...] |
rsa.c | 1 /* apps/rsa.c */ 11 * apply to all code found in this distribution, be it the RC4, RSA, 68 #include <openssl/rsa.h> 92 * -modulus - print the RSA key modulus 104 RSA *rsa=NULL; local 240 BIO_printf(bio_err," -modulus print the RSA key modulus\n"); 296 rsa = EVP_PKEY_get1_RSA(pkey); 300 if (rsa == NULL) 326 if (!RSA_print(out,rsa,0) [all...] |
rsautl.c | 66 #include <openssl/rsa.h> 100 RSA *rsa = NULL; local 224 rsa = EVP_PKEY_get1_RSA(pkey); 227 if(!rsa) { 228 BIO_printf(bio_err, "Error getting RSA key\n"); 258 keysize = RSA_size(rsa); 281 rsa_outlen = RSA_public_decrypt(rsa_inlen, rsa_in, rsa_out, rsa, pad); 285 rsa_outlen = RSA_private_encrypt(rsa_inlen, rsa_in, rsa_out, rsa, pad); 289 rsa_outlen = RSA_public_encrypt(rsa_inlen, rsa_in, rsa_out, rsa, pad) [all...] |
/external/chromium/third_party/libjingle/source/talk/base/ |
opensslidentity.cc | 35 #include <openssl/rsa.h> 46 // Strength of generated keys. Those are RSA. 61 RSA* rsa = RSA_generate_key(KEY_LENGTH, 0x10001, NULL, NULL); local 62 if (!EVP_PKEY_assign_RSA(pkey, rsa)) { 64 RSA_free(rsa); 70 RSA* rsa = RSA_new(); local 71 if (!pkey || !exponent || !rsa || 72 !BN_set_word(exponent, 0x10001) || // 65537 RSA exponen [all...] |
/external/openssh/ |
key.h | 30 #include <openssl/rsa.h> 79 RSA *rsa; member in struct:Key
|
ssh-pkcs11.c | 67 int (*orig_finish)(RSA *rsa); 171 /* openssl callback for freeing an RSA key */ 173 pkcs11_rsa_finish(RSA *rsa) 178 if ((k11 = RSA_get_app_data(rsa)) != NULL) { 180 rv = k11->orig_finish(rsa); 220 pkcs11_rsa_private_encrypt(int flen, const u_char *from, u_char *to, RSA *rsa, 247 if ((k11 = RSA_get_app_data(rsa)) == NULL) 393 RSA *rsa; local [all...] |
/external/openssl/ssl/ |
s2_srvr.c | 11 * apply to all code found in this distribution, be it the RC4, RSA, 1121 RSA *rsa; local 1134 rsa=c->pkeys[SSL_PKEY_RSA_ENC].privatekey->pkey.rsa; 1137 i=RSA_private_decrypt(len,from,to,rsa,padding);
|
ssl_rsa.c | 11 * apply to all code found in this distribution, be it the RC4, RSA, 152 int SSL_use_RSAPrivateKey(SSL *ssl, RSA *rsa) 157 if (rsa == NULL) 173 RSA_up_ref(rsa); 174 EVP_PKEY_assign_RSA(pkey,rsa); 205 (RSA_flags(pkey->pkey.rsa) & RSA_METHOD_FLAG_NO_CHECK)) 233 RSA *rsa=NULL; local 250 rsa=d2i_RSAPrivateKey_bio(in,NULL) 280 RSA *rsa; local 555 RSA *rsa=NULL; local 602 RSA *rsa; local [all...] |
s3_lib.c | 11 * apply to all code found in this distribution, be it the RC4, RSA, 172 /* The RSA ciphers */ 3148 RSA *rsa = (RSA *)parg; local 3474 RSA *rsa; local [all...] |
/hardware/samsung_slsi/exynos5/libkeymaster/ |
keymaster_mobicore.cpp | 27 #include <openssl/rsa.h> 63 void operator()(RSA* p) const { 67 typedef UniquePtr<RSA, RSA_Delete> Unique_RSA; 168 RSA* rsa = pkey.get()->pkey.rsa; local 169 if (rsa == NULL) { 170 logOpenSSLError("get rsa key format"); 176 metadata.lenpubmod = BN_bn2bin(rsa->n, kbuf + key_len); 189 metadata.lenpubexp = BN_bn2bin(rsa->e, kbuf + key_len) [all...] |