/external/chromium_org/third_party/openssl/openssl/crypto/rsa/ |
rsa_err.c | 1 /* crypto/rsa/rsa_err.c */ 63 #include <openssl/rsa.h> 148 {ERR_REASON(RSA_R_DIGEST_TOO_BIG_FOR_RSA_KEY),"digest too big for rsa key"}, 170 {ERR_REASON(RSA_R_NON_FIPS_RSA_METHOD) ,"non fips rsa method"}, 180 {ERR_REASON(RSA_R_RSA_OPERATIONS_NOT_SUPPORTED),"rsa operations not supported"},
|
rsa_test.c | 15 printf("No RSA support\n"); 19 #include <openssl/rsa.h> 33 static int key1(RSA *key, unsigned char *c) 82 static int key2(RSA *key, unsigned char *c) 127 static int key3(RSA *key, unsigned char *c) 214 RSA *key;
|
/external/ipsec-tools/src/racoon/ |
plainrsa-gen.c | 34 /* This file contains a generator for FreeS/WAN-style ipsec.secrets RSA keys. */ 51 #include <openssl/rsa.h> 67 fprintf(stderr, "Plain RSA key generator, part of %s\n", TOP_PACKAGE_STRING); 72 fprintf(stderr, " -b bits Generate <bits> long RSA key (default=1024)\n"); 85 mix_b64_pubkey(RSA *key) 121 RSA *key; 137 fprintf(fp, ": RSA\t{\n"); 138 fprintf(fp, "\t# RSA %zu bits\n", bits);
|
crypto_openssl.c | 969 res = eay_rsa_verify(source, sig, evp->pkey.rsa); 978 * check RSA signature 983 eay_check_rsasign(source, sig, rsa) 986 RSA *rsa; 988 return eay_rsa_verify(source, sig, rsa); 1124 sig = eay_rsa_sign(src, evp->pkey.rsa); 1132 eay_get_rsasign(src, rsa) 1134 RSA *rsa; [all...] |
/external/openssh/ |
auth.h | 33 #include <openssl/rsa.h>
|
ssh-pkcs11-helper.c | 181 slen = RSA_size(key->rsa); 184 found->rsa, RSA_PKCS1_PADDING)) != -1) {
|
/external/openssh/regress/ |
cfgmatch.sh | 79 cat $OBJ/rsa.pub >> $OBJ/authorized_keys_$USER
|
/external/openssl/crypto/rsa/ |
rsa_chk.c | 1 /* crypto/rsa/rsa_chk.c -*- Mode: C; c-file-style: "eay" -*- */ 53 #include <openssl/rsa.h> 56 int RSA_check_key(const RSA *key)
|
rsa_err.c | 1 /* crypto/rsa/rsa_err.c */ 63 #include <openssl/rsa.h> 148 {ERR_REASON(RSA_R_DIGEST_TOO_BIG_FOR_RSA_KEY),"digest too big for rsa key"}, 170 {ERR_REASON(RSA_R_NON_FIPS_RSA_METHOD) ,"non fips rsa method"}, 180 {ERR_REASON(RSA_R_RSA_OPERATIONS_NOT_SUPPORTED),"rsa operations not supported"},
|
rsa_test.c | 15 printf("No RSA support\n"); 19 #include <openssl/rsa.h> 33 static int key1(RSA *key, unsigned char *c) 82 static int key2(RSA *key, unsigned char *c) 127 static int key3(RSA *key, unsigned char *c) 214 RSA *key;
|
/libcore/crypto/src/main/java/org/conscrypt/ |
NativeCrypto.java | 83 // --- DSA/RSA public/private key handling functions ----------------------- 132 public static native byte[][] get_RSA_public_params(long rsa); 137 public static native byte[][] get_RSA_private_params(long rsa); 147 public static native byte[] i2d_RSAPublicKey(long rsa); 149 public static native byte[] i2d_RSAPrivateKey(long rsa); 608 add("TLS_ECDH_RSA_WITH_RC4_128_SHA", "ECDH-RSA-RC4-SHA"); 609 add("TLS_ECDH_RSA_WITH_AES_128_CBC_SHA", "ECDH-RSA-AES128-SHA"); 610 add("TLS_ECDH_RSA_WITH_AES_256_CBC_SHA", "ECDH-RSA-AES256-SHA"); 614 add("TLS_ECDHE_RSA_WITH_RC4_128_SHA", "ECDHE-RSA-RC4-SHA"); 615 add("TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA", "ECDHE-RSA-AES128-SHA") [all...] |
/system/security/keystore-engine/ |
eng_keystore.cpp | 38 #include <openssl/rsa.h> 93 * Called to initialize RSA's ex_data for the key_id handle. This should 192 ALOGE("RSA registration failed");
|
/external/chromium_org/third_party/openssl/openssl/crypto/pem/ |
pem_info.c | 11 * apply to all code found in this distribution, be it the RC4, RSA, 67 #include <openssl/rsa.h> 263 { /* encrypted RSA data */ 382 xi->x_pkey->dec_pkey->pkey.rsa,
|
/external/openssl/crypto/pem/ |
pem_info.c | 11 * apply to all code found in this distribution, be it the RC4, RSA, 67 #include <openssl/rsa.h> 263 { /* encrypted RSA data */ 382 xi->x_pkey->dec_pkey->pkey.rsa,
|
/external/chromium_org/third_party/openssl/openssl/apps/ |
apps.c | 11 * apply to all code found in this distribution, be it the RC4, RSA, 139 #include <openssl/rsa.h> 1016 RSA *rsa; local 1017 rsa = d2i_RSAPublicKey_bio(key, NULL); 1018 if (rsa) 1022 EVP_PKEY_set1_RSA(pkey, rsa); 1023 RSA_free(rsa); 1030 RSA *rsa; local 1076 RSA *rsa; local [all...] |
/external/openssl/apps/ |
apps.c | 11 * apply to all code found in this distribution, be it the RC4, RSA, 139 #include <openssl/rsa.h> 1016 RSA *rsa; local 1017 rsa = d2i_RSAPublicKey_bio(key, NULL); 1018 if (rsa) 1022 EVP_PKEY_set1_RSA(pkey, rsa); 1023 RSA_free(rsa); 1030 RSA *rsa; local 1076 RSA *rsa; local [all...] |
/external/chromium_org/third_party/openssl/openssl/ssl/ |
d1_clnt.c | 68 * apply to all code found in this distribution, be it the RC4, RSA, 988 RSA *rsa; local 992 rsa=s->session->sess_cert->peer_rsa_tmp; 998 (pkey->pkey.rsa == NULL)) 1003 rsa=pkey->pkey.rsa; 1019 tmp_buf,p,rsa,RSA_PKCS1_PADDING); [all...] |
s3_lib.c | 11 * apply to all code found in this distribution, be it the RC4, RSA, 172 /* The RSA ciphers */ 3148 RSA *rsa = (RSA *)parg; local 3474 RSA *rsa; local [all...] |
/external/openssl/ssl/ |
d1_clnt.c | 68 * apply to all code found in this distribution, be it the RC4, RSA, 988 RSA *rsa; local 992 rsa=s->session->sess_cert->peer_rsa_tmp; 998 (pkey->pkey.rsa == NULL)) 1003 rsa=pkey->pkey.rsa; 1019 tmp_buf,p,rsa,RSA_PKCS1_PADDING); [all...] |
s3_lib.c | 11 * apply to all code found in this distribution, be it the RC4, RSA, 172 /* The RSA ciphers */ 3161 RSA *rsa = (RSA *)parg; local 3487 RSA *rsa; local [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/rsa/ |
AlgorithmParametersSpi.java | 1 package org.bouncycastle.jcajce.provider.asymmetric.rsa;
|
BCRSAPrivateCrtKey.java | 1 package org.bouncycastle.jcajce.provider.asymmetric.rsa; 17 * A provider representation for a RSA private key, with CRT factors included. 87 * construct an RSA key from a private key info object. 97 * construct an RSA key from a ASN.1 RSA private key object. 229 buf.append("RSA Private CRT Key").append(nl);
|
DigestSignatureSpi.java | 1 package org.bouncycastle.jcajce.provider.asymmetric.rsa; 257 // For raw RSA, the DigestInfo must be prepared externally
|
/external/chromium/crypto/ |
rsa_private_key_nss.cc | 117 // Make sure the key is an RSA key. If not, that's an error 124 SECItem *ck_id = PK11_MakeIDFromPubKey(&(result->public_key_->u.rsa.modulus));
|
/external/chromium_org/chrome/third_party/mozilla_security_manager/ |
nsNSSCertHelper.cpp | [all...] |