HomeSort by relevance Sort by last modified time
    Searched refs:rsa (Results 276 - 293 of 293) sorted by null

<<1112

  /external/openssl/include/openssl/
ts.h 78 #include <openssl/rsa.h>
  /external/wpa_supplicant_8/hostapd/
Android.mk 582 OBJS += src/crypto/crypto_internal-rsa.c
591 OBJS += src/tls/rsa.c
Makefile 534 OBJS += ../src/crypto/crypto_internal-rsa.o
543 OBJS += ../src/tls/rsa.o
  /hardware/libhardware/tests/keymaster/
keymaster_test.cpp 183 void operator()(RSA* p) const {
187 typedef UniquePtr<RSA, RSA_Delete> Unique_RSA;
198 * DER-encoded PKCS#8 format RSA key. Generated using:
406 << "Should generate an RSA key with " << GetParam() << " bit modulus size";
414 << "Should be able to retrieve RSA public key successfully";
424 << "Generated key type should be of type RSA";
426 Unique_RSA rsa(EVP_PKEY_get1_RSA(actual.get()));
427 ASSERT_FALSE(rsa.get() == NULL)
428 << "Should be able to extract RSA key from EVP_PKEY";
430 ASSERT_EQ(static_cast<unsigned long>(RSA_F4), BN_get_word(rsa.get()->e)
    [all...]
  /external/chromium_org/third_party/openssl/openssl/apps/
req.c 11 * apply to all code found in this distribution, be it the RC4, RSA,
84 #include <openssl/rsa.h>
121 * -modulus - print RSA modulus.
415 BIO_printf(bio_err," -modulus RSA modulus\n");
428 BIO_printf(bio_err," -newkey rsa:bits generate a new RSA key of 'bits' in size\n");
1039 BN_print(out,tpubkey->pkey.rsa->n);
    [all...]
speed.c 11 * apply to all code found in this distribution, be it the RC4, RSA,
178 #include <openssl/rsa.h>
529 RSA *rsa_key[RSA_NUM];
942 if (strcmp(*argv,"rsa") == 0)
1123 BIO_printf(bio_err,"rsa ");
1196 BIO_printf(bio_err,"internal error loading RSA key number %d\n",i);
1203 : "Loaded RSA key, %d bit modulus and e= 0x",
    [all...]
  /external/openssl/apps/
req.c 11 * apply to all code found in this distribution, be it the RC4, RSA,
84 #include <openssl/rsa.h>
121 * -modulus - print RSA modulus.
415 BIO_printf(bio_err," -modulus RSA modulus\n");
428 BIO_printf(bio_err," -newkey rsa:bits generate a new RSA key of 'bits' in size\n");
1039 BN_print(out,tpubkey->pkey.rsa->n);
    [all...]
speed.c 11 * apply to all code found in this distribution, be it the RC4, RSA,
178 #include <openssl/rsa.h>
529 RSA *rsa_key[RSA_NUM];
942 if (strcmp(*argv,"rsa") == 0)
1123 BIO_printf(bio_err,"rsa ");
1196 BIO_printf(bio_err,"internal error loading RSA key number %d\n",i);
1203 : "Loaded RSA key, %d bit modulus and e= 0x",
    [all...]
  /external/ipsec-tools/src/racoon/
oakley.c 962 * base:psk,rsa
    [all...]
eaytest.c 106 error = eay_check_rsasign(src, sig, evp->pkey.rsa);
122 "-----BEGIN RSA PRIVATE KEY-----\n"
136 "-----END RSA PRIVATE KEY-----\n\n";
169 printf("RSA signed data.\n");
1014 { "rsa", rsatest, },
  /external/dropbear/libtomcrypt/
crypt.tex 121 public key cryptography (via PKCS \#1 RSA, DH or ECCDH), and a plethora of support routines.
172 that for the PRNG needs within the library (\textit{e.g. making a RSA key}). All the developer has to do
319 Certain functions such as (for example) \textit{rsa\_export()} give an output that is variable length. To prevent buffer overflows you
321 \index{rsa\_export()} \index{error\_to\_string()} \index{variable length output}
331 /* ... Make up the RSA key somehow ... */
343 printf("RSA exported key takes %d bytes\n", x);
351 In the above example if the size of the RSA public key was more than 1024 bytes this function would return an error code
360 Certain functions such as \textit{rsa\_make\_key()} require a Pseudo Random Number Generator (PRNG). These functions do not setup
366 \index{register\_prng()} \index{rsa\_make\_key()}
377 /* make a 1024-bit RSA key with the system RNG *
    [all...]
  /external/chromium_org/third_party/openssl/openssl/ssl/
s2_clnt.c 11 * apply to all code found in this distribution, be it the RC4, RSA,
1114 i=RSA_public_encrypt(len,from,to,pkey->pkey.rsa,padding);
ssl_locl.h 11 * apply to all code found in this distribution, be it the RC4, RSA,
159 #include <openssl/rsa.h>
291 #define SSL_kRSA 0x00000001L /* RSA key exchange */
292 #define SSL_kDHr 0x00000002L /* DH cert, RSA CA cert */ /* no such ciphersuites supported! */
296 #define SSL_kECDHr 0x00000020L /* ECDH cert, RSA CA cert */
304 #define SSL_aRSA 0x00000001L /* RSA auth */
505 RSA *rsa_tmp;
506 RSA *(*rsa_tmp_cb)(SSL *ssl,int is_export,int keysize);
537 RSA *peer_rsa_tmp; /* not used for SSL 2 */
    [all...]
  /external/openssl/ssl/
s2_clnt.c 11 * apply to all code found in this distribution, be it the RC4, RSA,
1114 i=RSA_public_encrypt(len,from,to,pkey->pkey.rsa,padding);
ssl_locl.h 11 * apply to all code found in this distribution, be it the RC4, RSA,
159 #include <openssl/rsa.h>
291 #define SSL_kRSA 0x00000001L /* RSA key exchange */
292 #define SSL_kDHr 0x00000002L /* DH cert, RSA CA cert */ /* no such ciphersuites supported! */
296 #define SSL_kECDHr 0x00000020L /* ECDH cert, RSA CA cert */
304 #define SSL_aRSA 0x00000001L /* RSA auth */
503 RSA *rsa_tmp;
504 RSA *(*rsa_tmp_cb)(SSL *ssl,int is_export,int keysize);
535 RSA *peer_rsa_tmp; /* not used for SSL 2 */
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
Makefile 977 OBJS += ../src/crypto/crypto_internal-rsa.o
986 OBJS += ../src/tls/rsa.o
    [all...]
  /external/chromium_org/net/third_party/nss/ssl/
ssl3con.c 698 * that the server uses an RSA cert for (EC)DHE-RSA.
717 * ECDSA- and RSA-signed EC certificates so
    [all...]
  /external/dropbear/
configure     [all...]

Completed in 7622 milliseconds

<<1112