HomeSort by relevance Sort by last modified time
    Searched defs:rsa (Results 1 - 25 of 45) sorted by null

1 2

  /libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/func/
CipherRSATest.java 23 CipherRSAThread rsa = new CipherRSAThread("RSA", new int[] {512}, local
28 rsa.launcher();
30 assertEquals(rsa.getFailureMessages(), 0, rsa.getTotalFailuresNumber());
35 CipherRSAThread rsa = new CipherRSAThread("RSA", new int[] {1024}, local
40 rsa.launcher();
42 assertEquals(rsa.getFailureMessages(), 0, rsa.getTotalFailuresNumber())
47 CipherRSAThread rsa = new CipherRSAThread("RSA", new int[] {2048}, local
57 CipherRSAThread rsa = new CipherRSAThread("RSA", new int[] {1024}, local
    [all...]
  /external/openssl/crypto/rsa/
rsa_depr.c 1 /* crypto/rsa/rsa_depr.c */
63 #include <openssl/rsa.h>
71 RSA *RSA_generate_key(int bits, unsigned long e_value,
76 RSA *rsa = RSA_new(); local
79 if(!rsa || !e) goto err;
92 if(RSA_generate_key_ex(rsa, bits, e, &cb)) {
94 return rsa;
98 if(rsa) RSA_free(rsa);
    [all...]
rsa_pmeth.c 1 /* crypto/rsa/rsa_pmeth.c */
63 #include <openssl/rsa.h>
75 /* RSA pkey context structure */
84 /* RSA padding mode */
169 RSA *rsa = ctx->pkey->pkey.rsa; local
173 if (rsa->flags & RSA_FLAG_NON_FIPS_ALLOW)
175 if (!(rsa->meth->flags & RSA_FLAG_FIPS_METHOD) && rv)
190 RSA *rsa = ctx->pkey->pkey.rsa local
344 RSA *rsa = ctx->pkey->pkey.rsa; local
658 RSA *rsa = NULL; local
    [all...]
rsa_ameth.c 1 /* crypto/rsa/rsa_ameth.c */
63 #include <openssl/rsa.h>
74 penclen = i2d_RSAPublicKey(pkey->pkey.rsa, &penc);
89 RSA *rsa = NULL; local
92 if (!(rsa = d2i_RSAPublicKey(NULL, &p, pklen)))
97 EVP_PKEY_assign_RSA (pkey, rsa);
103 if (BN_cmp(b->pkey.rsa->n,a->pkey.rsa->n) != 0
104 || BN_cmp(b->pkey.rsa->e,a->pkey.rsa->e) != 0
112 RSA *rsa; local
    [all...]
  /external/ipsec-tools/src/racoon/
rsalist.h 38 #include <openssl/rsa.h>
52 RSA *rsa; member in struct:rsa_key
55 int rsa_key_insert(struct genlist *list, struct netaddr *src, struct netaddr *dst, RSA *rsa);
59 RSA *rsa_try_check_rsasign(vchar_t *source, vchar_t *sig, struct genlist *list);
prsa_par.h 96 RSA *rsa; member in union:YYSTYPE
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/rsa/
KeyFactorySpi.java 1 package org.bouncycastle.jcajce.provider.asymmetric.rsa;
RSAUtil.java 1 package org.bouncycastle.jcajce.provider.asymmetric.rsa;
14 * utility class for converting java.security RSA objects into their
KeyPairGeneratorSpi.java 1 package org.bouncycastle.jcajce.provider.asymmetric.rsa;
33 super("RSA");
AlgorithmParametersSpi.java 1 package org.bouncycastle.jcajce.provider.asymmetric.rsa;
BCRSAPublicKey.java 1 package org.bouncycastle.jcajce.provider.asymmetric.rsa;
56 throw new IllegalArgumentException("invalid info structure in RSA public key");
82 return "RSA";
123 buf.append("RSA Public Key").append(nl);
BCRSAPrivateCrtKey.java 1 package org.bouncycastle.jcajce.provider.asymmetric.rsa;
17 * A provider representation for a RSA private key, with CRT factors included.
87 * construct an RSA key from a private key info object.
97 * construct an RSA key from a ASN.1 RSA private key object.
229 buf.append("RSA Private CRT Key").append(nl);
BCRSAPrivateKey.java 1 package org.bouncycastle.jcajce.provider.asymmetric.rsa;
70 return "RSA";
CipherSpi.java 1 package org.bouncycastle.jcajce.provider.asymmetric.rsa;
104 throw new IllegalStateException("RSA Cipher not initialised");
124 throw new IllegalArgumentException("not an RSA key!");
136 throw new IllegalStateException("RSA Cipher not initialised");
240 throw new NoSuchPaddingException(padding + " unavailable with RSA.");
277 throw new InvalidKeyException("unknown key type passed to RSA");
344 throw new InvalidParameterException("unknown opmode " + opmode + " passed to RSA");
401 throw new ArrayIndexOutOfBoundsException("too much data for RSA block");
408 throw new ArrayIndexOutOfBoundsException("too much data for RSA block");
428 throw new ArrayIndexOutOfBoundsException("too much data for RSA block")
    [all...]
DigestSignatureSpi.java 1 package org.bouncycastle.jcajce.provider.asymmetric.rsa;
257 // For raw RSA, the DigestInfo must be prepared externally
  /external/openssl/apps/
genrsa.c 11 * apply to all code found in this distribution, be it the RC4, RSA,
75 #include <openssl/rsa.h>
108 RSA *rsa = NULL; local
266 BIO_printf(bio_err,"Generating RSA private key, %d bit long modulus\n",
269 rsa = RSA_new();
271 rsa = RSA_new_method(e);
273 if (!rsa)
276 if(!BN_set_word(bn, f4) || !RSA_generate_key_ex(rsa, num, bn, &cb))
284 for (i=0; i<rsa->e->top; i++
    [all...]
rsa.c 1 /* apps/rsa.c */
11 * apply to all code found in this distribution, be it the RC4, RSA,
68 #include <openssl/rsa.h>
92 * -modulus - print the RSA key modulus
104 RSA *rsa=NULL; local
240 BIO_printf(bio_err," -modulus print the RSA key modulus\n");
296 rsa = EVP_PKEY_get1_RSA(pkey);
300 if (rsa == NULL)
326 if (!RSA_print(out,rsa,0)
    [all...]
rsautl.c 66 #include <openssl/rsa.h>
100 RSA *rsa = NULL; local
224 rsa = EVP_PKEY_get1_RSA(pkey);
227 if(!rsa) {
228 BIO_printf(bio_err, "Error getting RSA key\n");
258 keysize = RSA_size(rsa);
281 rsa_outlen = RSA_public_decrypt(rsa_inlen, rsa_in, rsa_out, rsa, pad);
285 rsa_outlen = RSA_private_encrypt(rsa_inlen, rsa_in, rsa_out, rsa, pad);
289 rsa_outlen = RSA_public_encrypt(rsa_inlen, rsa_in, rsa_out, rsa, pad)
    [all...]
  /external/chromium/third_party/libjingle/source/talk/base/
opensslidentity.cc 35 #include <openssl/rsa.h>
46 // Strength of generated keys. Those are RSA.
61 RSA* rsa = RSA_generate_key(KEY_LENGTH, 0x10001, NULL, NULL); local
62 if (!EVP_PKEY_assign_RSA(pkey, rsa)) {
64 RSA_free(rsa);
70 RSA* rsa = RSA_new(); local
71 if (!pkey || !exponent || !rsa ||
72 !BN_set_word(exponent, 0x10001) || // 65537 RSA exponen
    [all...]
  /external/openssh/
key.h 30 #include <openssl/rsa.h>
79 RSA *rsa; member in struct:Key
ssh-pkcs11.c 67 int (*orig_finish)(RSA *rsa);
171 /* openssl callback for freeing an RSA key */
173 pkcs11_rsa_finish(RSA *rsa)
178 if ((k11 = RSA_get_app_data(rsa)) != NULL) {
180 rv = k11->orig_finish(rsa);
220 pkcs11_rsa_private_encrypt(int flen, const u_char *from, u_char *to, RSA *rsa,
247 if ((k11 = RSA_get_app_data(rsa)) == NULL)
393 RSA *rsa; local
    [all...]
  /external/openssl/ssl/
s2_srvr.c 11 * apply to all code found in this distribution, be it the RC4, RSA,
1121 RSA *rsa; local
1134 rsa=c->pkeys[SSL_PKEY_RSA_ENC].privatekey->pkey.rsa;
1137 i=RSA_private_decrypt(len,from,to,rsa,padding);
ssl_rsa.c 11 * apply to all code found in this distribution, be it the RC4, RSA,
152 int SSL_use_RSAPrivateKey(SSL *ssl, RSA *rsa)
157 if (rsa == NULL)
173 RSA_up_ref(rsa);
174 EVP_PKEY_assign_RSA(pkey,rsa);
205 (RSA_flags(pkey->pkey.rsa) & RSA_METHOD_FLAG_NO_CHECK))
233 RSA *rsa=NULL; local
250 rsa=d2i_RSAPrivateKey_bio(in,NULL)
280 RSA *rsa; local
555 RSA *rsa=NULL; local
602 RSA *rsa; local
    [all...]
s3_lib.c 11 * apply to all code found in this distribution, be it the RC4, RSA,
172 /* The RSA ciphers */
3148 RSA *rsa = (RSA *)parg; local
3474 RSA *rsa; local
    [all...]
  /hardware/samsung_slsi/exynos5/libkeymaster/
keymaster_mobicore.cpp 27 #include <openssl/rsa.h>
63 void operator()(RSA* p) const {
67 typedef UniquePtr<RSA, RSA_Delete> Unique_RSA;
168 RSA* rsa = pkey.get()->pkey.rsa; local
169 if (rsa == NULL) {
170 logOpenSSLError("get rsa key format");
176 metadata.lenpubmod = BN_bn2bin(rsa->n, kbuf + key_len);
189 metadata.lenpubexp = BN_bn2bin(rsa->e, kbuf + key_len)
    [all...]

Completed in 823 milliseconds

1 2