HomeSort by relevance Sort by last modified time
    Searched refs:rsa (Results 201 - 225 of 293) sorted by null

1 2 3 4 5 6 7 891011>>

  /external/chromium_org/third_party/openssl/openssl/crypto/rsa/
rsa_err.c 1 /* crypto/rsa/rsa_err.c */
63 #include <openssl/rsa.h>
148 {ERR_REASON(RSA_R_DIGEST_TOO_BIG_FOR_RSA_KEY),"digest too big for rsa key"},
170 {ERR_REASON(RSA_R_NON_FIPS_RSA_METHOD) ,"non fips rsa method"},
180 {ERR_REASON(RSA_R_RSA_OPERATIONS_NOT_SUPPORTED),"rsa operations not supported"},
rsa_test.c 15 printf("No RSA support\n");
19 #include <openssl/rsa.h>
33 static int key1(RSA *key, unsigned char *c)
82 static int key2(RSA *key, unsigned char *c)
127 static int key3(RSA *key, unsigned char *c)
214 RSA *key;
  /external/ipsec-tools/src/racoon/
plainrsa-gen.c 34 /* This file contains a generator for FreeS/WAN-style ipsec.secrets RSA keys. */
51 #include <openssl/rsa.h>
67 fprintf(stderr, "Plain RSA key generator, part of %s\n", TOP_PACKAGE_STRING);
72 fprintf(stderr, " -b bits Generate <bits> long RSA key (default=1024)\n");
85 mix_b64_pubkey(RSA *key)
121 RSA *key;
137 fprintf(fp, ": RSA\t{\n");
138 fprintf(fp, "\t# RSA %zu bits\n", bits);
crypto_openssl.c 969 res = eay_rsa_verify(source, sig, evp->pkey.rsa);
978 * check RSA signature
983 eay_check_rsasign(source, sig, rsa)
986 RSA *rsa;
988 return eay_rsa_verify(source, sig, rsa);
1124 sig = eay_rsa_sign(src, evp->pkey.rsa);
1132 eay_get_rsasign(src, rsa)
1134 RSA *rsa;
    [all...]
  /external/openssh/
auth.h 33 #include <openssl/rsa.h>
ssh-pkcs11-helper.c 181 slen = RSA_size(key->rsa);
184 found->rsa, RSA_PKCS1_PADDING)) != -1) {
  /external/openssh/regress/
cfgmatch.sh 79 cat $OBJ/rsa.pub >> $OBJ/authorized_keys_$USER
  /external/openssl/crypto/rsa/
rsa_chk.c 1 /* crypto/rsa/rsa_chk.c -*- Mode: C; c-file-style: "eay" -*- */
53 #include <openssl/rsa.h>
56 int RSA_check_key(const RSA *key)
rsa_err.c 1 /* crypto/rsa/rsa_err.c */
63 #include <openssl/rsa.h>
148 {ERR_REASON(RSA_R_DIGEST_TOO_BIG_FOR_RSA_KEY),"digest too big for rsa key"},
170 {ERR_REASON(RSA_R_NON_FIPS_RSA_METHOD) ,"non fips rsa method"},
180 {ERR_REASON(RSA_R_RSA_OPERATIONS_NOT_SUPPORTED),"rsa operations not supported"},
rsa_test.c 15 printf("No RSA support\n");
19 #include <openssl/rsa.h>
33 static int key1(RSA *key, unsigned char *c)
82 static int key2(RSA *key, unsigned char *c)
127 static int key3(RSA *key, unsigned char *c)
214 RSA *key;
  /libcore/crypto/src/main/java/org/conscrypt/
NativeCrypto.java 83 // --- DSA/RSA public/private key handling functions -----------------------
132 public static native byte[][] get_RSA_public_params(long rsa);
137 public static native byte[][] get_RSA_private_params(long rsa);
147 public static native byte[] i2d_RSAPublicKey(long rsa);
149 public static native byte[] i2d_RSAPrivateKey(long rsa);
608 add("TLS_ECDH_RSA_WITH_RC4_128_SHA", "ECDH-RSA-RC4-SHA");
609 add("TLS_ECDH_RSA_WITH_AES_128_CBC_SHA", "ECDH-RSA-AES128-SHA");
610 add("TLS_ECDH_RSA_WITH_AES_256_CBC_SHA", "ECDH-RSA-AES256-SHA");
614 add("TLS_ECDHE_RSA_WITH_RC4_128_SHA", "ECDHE-RSA-RC4-SHA");
615 add("TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA", "ECDHE-RSA-AES128-SHA")
    [all...]
  /system/security/keystore-engine/
eng_keystore.cpp 38 #include <openssl/rsa.h>
93 * Called to initialize RSA's ex_data for the key_id handle. This should
192 ALOGE("RSA registration failed");
  /external/chromium_org/third_party/openssl/openssl/crypto/pem/
pem_info.c 11 * apply to all code found in this distribution, be it the RC4, RSA,
67 #include <openssl/rsa.h>
263 { /* encrypted RSA data */
382 xi->x_pkey->dec_pkey->pkey.rsa,
  /external/openssl/crypto/pem/
pem_info.c 11 * apply to all code found in this distribution, be it the RC4, RSA,
67 #include <openssl/rsa.h>
263 { /* encrypted RSA data */
382 xi->x_pkey->dec_pkey->pkey.rsa,
  /external/chromium_org/third_party/openssl/openssl/apps/
apps.c 11 * apply to all code found in this distribution, be it the RC4, RSA,
139 #include <openssl/rsa.h>
1016 RSA *rsa; local
1017 rsa = d2i_RSAPublicKey_bio(key, NULL);
1018 if (rsa)
1022 EVP_PKEY_set1_RSA(pkey, rsa);
1023 RSA_free(rsa);
1030 RSA *rsa; local
1076 RSA *rsa; local
    [all...]
  /external/openssl/apps/
apps.c 11 * apply to all code found in this distribution, be it the RC4, RSA,
139 #include <openssl/rsa.h>
1016 RSA *rsa; local
1017 rsa = d2i_RSAPublicKey_bio(key, NULL);
1018 if (rsa)
1022 EVP_PKEY_set1_RSA(pkey, rsa);
1023 RSA_free(rsa);
1030 RSA *rsa; local
1076 RSA *rsa; local
    [all...]
  /external/chromium_org/third_party/openssl/openssl/ssl/
d1_clnt.c 68 * apply to all code found in this distribution, be it the RC4, RSA,
988 RSA *rsa; local
992 rsa=s->session->sess_cert->peer_rsa_tmp;
998 (pkey->pkey.rsa == NULL))
1003 rsa=pkey->pkey.rsa;
1019 tmp_buf,p,rsa,RSA_PKCS1_PADDING);
    [all...]
s3_lib.c 11 * apply to all code found in this distribution, be it the RC4, RSA,
172 /* The RSA ciphers */
3148 RSA *rsa = (RSA *)parg; local
3474 RSA *rsa; local
    [all...]
  /external/openssl/ssl/
d1_clnt.c 68 * apply to all code found in this distribution, be it the RC4, RSA,
988 RSA *rsa; local
992 rsa=s->session->sess_cert->peer_rsa_tmp;
998 (pkey->pkey.rsa == NULL))
1003 rsa=pkey->pkey.rsa;
1019 tmp_buf,p,rsa,RSA_PKCS1_PADDING);
    [all...]
s3_lib.c 11 * apply to all code found in this distribution, be it the RC4, RSA,
172 /* The RSA ciphers */
3161 RSA *rsa = (RSA *)parg; local
3487 RSA *rsa; local
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/rsa/
AlgorithmParametersSpi.java 1 package org.bouncycastle.jcajce.provider.asymmetric.rsa;
BCRSAPrivateCrtKey.java 1 package org.bouncycastle.jcajce.provider.asymmetric.rsa;
17 * A provider representation for a RSA private key, with CRT factors included.
87 * construct an RSA key from a private key info object.
97 * construct an RSA key from a ASN.1 RSA private key object.
229 buf.append("RSA Private CRT Key").append(nl);
DigestSignatureSpi.java 1 package org.bouncycastle.jcajce.provider.asymmetric.rsa;
257 // For raw RSA, the DigestInfo must be prepared externally
  /external/chromium/crypto/
rsa_private_key_nss.cc 117 // Make sure the key is an RSA key. If not, that's an error
124 SECItem *ck_id = PK11_MakeIDFromPubKey(&(result->public_key_->u.rsa.modulus));
  /external/chromium_org/chrome/third_party/mozilla_security_manager/
nsNSSCertHelper.cpp     [all...]

Completed in 1843 milliseconds

1 2 3 4 5 6 7 891011>>