/external/chromium_org/third_party/boringssl/src/crypto/rsa/ |
rsa_asn1.c | 56 #include <openssl/rsa.h> 74 RSA_free((RSA *)*pval); 82 ASN1_SIMPLE(RSA, version, LONG), 83 ASN1_SIMPLE(RSA, n, BIGNUM), 84 ASN1_SIMPLE(RSA, e, BIGNUM), 85 ASN1_SIMPLE(RSA, d, BIGNUM), 86 ASN1_SIMPLE(RSA, p, BIGNUM), 87 ASN1_SIMPLE(RSA, q, BIGNUM), 88 ASN1_SIMPLE(RSA, dmp1, BIGNUM), 89 ASN1_SIMPLE(RSA, dmq1, BIGNUM) [all...] |
blinding.c | 62 * apply to all code found in this distribution, be it the RC4, RSA, 109 #include <openssl/rsa.h> 137 OPENSSL_PUT_ERROR(RSA, BN_BLINDING_new, ERR_R_MALLOC_FAILURE); 197 OPENSSL_PUT_ERROR(RSA, BN_BLINDING_update, RSA_R_BN_NOT_INITIALIZED); 237 OPENSSL_PUT_ERROR(RSA, BN_BLINDING_convert_ex, RSA_R_BN_NOT_INITIALIZED); 273 OPENSSL_PUT_ERROR(RSA, BN_BLINDING_invert_ex, RSA_R_BN_NOT_INITIALIZED); 337 /* this should almost never happen for good RSA keys */ 341 OPENSSL_PUT_ERROR(RSA, BN_BLINDING_create_param, 408 BN_BLINDING *rsa_setup_blinding(RSA *rsa, BN_CTX *in_ctx) [all...] |
internal.h | 10 * apply to all code found in this distribution, be it the RC4, RSA, 92 BN_BLINDING *rsa_setup_blinding(RSA *rsa, BN_CTX *in_ctx); 117 int RSA_verify_PKCS1_PSS_mgf1(RSA *rsa, const uint8_t *mHash, 121 int RSA_padding_add_PKCS1_PSS_mgf1(RSA *rsa, uint8_t *EM, const uint8_t *mHash, 128 int RSA_private_transform(RSA *rsa, uint8_t *out, const uint8_t *in,
|
/external/openssl/crypto/rsa/ |
rsa_asn1.c | 62 #include <openssl/rsa.h> 75 RSA_free((RSA *)*pval); 83 ASN1_SIMPLE(RSA, version, LONG), 84 ASN1_SIMPLE(RSA, n, BIGNUM), 85 ASN1_SIMPLE(RSA, e, BIGNUM), 86 ASN1_SIMPLE(RSA, d, BIGNUM), 87 ASN1_SIMPLE(RSA, p, BIGNUM), 88 ASN1_SIMPLE(RSA, q, BIGNUM), 89 ASN1_SIMPLE(RSA, dmp1, BIGNUM), 90 ASN1_SIMPLE(RSA, dmq1, BIGNUM) [all...] |
rsa_pmeth.c | 1 /* crypto/rsa/rsa_pmeth.c */ 63 #include <openssl/rsa.h> 75 /* RSA pkey context structure */ 84 /* RSA padding mode */ 169 RSA *rsa = ctx->pkey->pkey.rsa; local 173 if (rsa->flags & RSA_FLAG_NON_FIPS_ALLOW) 175 if (!(rsa->meth->flags & RSA_FLAG_FIPS_METHOD) && rv) 190 RSA *rsa = ctx->pkey->pkey.rsa local 344 RSA *rsa = ctx->pkey->pkey.rsa; local 660 RSA *rsa = NULL; local [all...] |
rsa_lib.c | 1 /* crypto/rsa/rsa_lib.c */ 11 * apply to all code found in this distribution, be it the RC4, RSA, 64 #include <openssl/rsa.h> 74 const char RSA_version[]="RSA" OPENSSL_VERSION_PTEXT; 78 RSA *RSA_new(void) 80 RSA *r=RSA_new_method(NULL); 111 const RSA_METHOD *RSA_get_method(const RSA *rsa) 113 return rsa->meth; 116 int RSA_set_method(RSA *rsa, const RSA_METHOD *meth [all...] |
rsa_pss.c | 62 #include <openssl/rsa.h> 73 int RSA_verify_PKCS1_PSS(RSA *rsa, const unsigned char *mHash, 76 return RSA_verify_PKCS1_PSS_mgf1(rsa, mHash, Hash, NULL, EM, sLen); 79 int RSA_verify_PKCS1_PSS_mgf1(RSA *rsa, const unsigned char *mHash, 112 MSBits = (BN_num_bits(rsa->n) - 1) & 0x7; 113 emLen = RSA_size(rsa); 187 int RSA_padding_add_PKCS1_PSS(RSA *rsa, unsigned char *EM [all...] |
rsa_none.c | 1 /* crypto/rsa/rsa_none.c */ 11 * apply to all code found in this distribution, be it the RC4, RSA, 62 #include <openssl/rsa.h>
|
/external/chromium_org/third_party/boringssl/src/crypto/evp/ |
p_rsa.c | 64 #include <openssl/rsa.h> 66 #include "../rsa/internal.h" 74 /* RSA padding mode */ 82 /* tbuf is a buffer which is either NULL, or is the size of the RSA modulus. 83 * It's used to store the output of RSA operations. */ 172 RSA *rsa = ctx->pkey->pkey.rsa; local 200 if (!RSA_sign(EVP_MD_type(rctx->md), tbs, tbslen, sig, &out_len, rsa)) { 208 !RSA_padding_add_PKCS1_PSS_mgf1(rsa, rctx->tbuf, tbs, rctx->md 228 RSA *rsa = ctx->pkey->pkey.rsa; local 266 RSA *rsa = ctx->pkey->pkey.rsa; local 298 RSA *rsa = ctx->pkey->pkey.rsa; local 493 RSA *rsa = NULL; local [all...] |
/external/openssl/apps/ |
rsa.c | 1 /* apps/rsa.c */ 11 * apply to all code found in this distribution, be it the RC4, RSA, 68 #include <openssl/rsa.h> 92 * -modulus - print the RSA key modulus 104 RSA *rsa=NULL; local 240 BIO_printf(bio_err," -modulus print the RSA key modulus\n"); 296 rsa = EVP_PKEY_get1_RSA(pkey); 300 if (rsa == NULL) 326 if (!RSA_print(out,rsa,0) [all...] |
genrsa.c | 11 * apply to all code found in this distribution, be it the RC4, RSA, 75 #include <openssl/rsa.h> 108 RSA *rsa = NULL; local 266 BIO_printf(bio_err,"Generating RSA private key, %d bit long modulus\n", 269 rsa = RSA_new(); 271 rsa = RSA_new_method(e); 273 if (!rsa) 276 if(!BN_set_word(bn, f4) || !RSA_generate_key_ex(rsa, num, bn, &cb)) 284 for (i=0; i<rsa->e->top; i++ [all...] |
rsautl.c | 66 #include <openssl/rsa.h> 100 RSA *rsa = NULL; local 224 rsa = EVP_PKEY_get1_RSA(pkey); 227 if(!rsa) { 228 BIO_printf(bio_err, "Error getting RSA key\n"); 258 keysize = RSA_size(rsa); 281 rsa_outlen = RSA_public_decrypt(rsa_inlen, rsa_in, rsa_out, rsa, pad); 285 rsa_outlen = RSA_private_encrypt(rsa_inlen, rsa_in, rsa_out, rsa, pad); 289 rsa_outlen = RSA_public_encrypt(rsa_inlen, rsa_in, rsa_out, rsa, pad) [all...] |
/external/google-tv-pairing-protocol/cpp/tests/polo/util/ |
certificateutiltest.cc | 56 std::string rsa_string = "-----BEGIN RSA PRIVATE KEY-----\n" 70 "-----END RSA PRIVATE KEY-----\n"; 73 RSA* rsa = PEM_read_bio_RSAPrivateKey(rsa_bio, NULL, NULL, NULL); local 76 EVP_PKEY_assign_RSA(pkey, rsa); 116 std::string pem = "-----BEGIN RSA PRIVATE KEY-----\n" 133 "-----END RSA PRIVATE KEY-----\n"; 139 RSA* rsa = EVP_PKEY_get1_RSA(pkey); local 140 ASSERT_TRUE(rsa); 148 RSA* rsa = RSA_generate_key(1025, RSA_F4, NULL, NULL); local [all...] |
/external/openssl/ssl/ |
ssl_rsa.c | 11 * apply to all code found in this distribution, be it the RC4, RSA, 152 int SSL_use_RSAPrivateKey(SSL *ssl, RSA *rsa) 157 if (rsa == NULL) 173 RSA_up_ref(rsa); 174 EVP_PKEY_assign_RSA(pkey,rsa); 205 (RSA_flags(pkey->pkey.rsa) & RSA_METHOD_FLAG_NO_CHECK)) 233 RSA *rsa=NULL; local 250 rsa=d2i_RSAPrivateKey_bio(in,NULL) 280 RSA *rsa; local 555 RSA *rsa=NULL; local 602 RSA *rsa; local [all...] |
/external/chromium_org/chrome/common/extensions/api/networking_private/ |
networking_private_crypto_openssl.cc | 9 #include <openssl/rsa.h> 152 crypto::ScopedRSA rsa(d2i_RSAPublicKey(NULL, &ptr, pub_key_der.size())); 153 if (!rsa || ptr != end || RSA_size(rsa.get()) == 0) { 158 scoped_ptr<uint8_t[]> rsa_output(new uint8_t[RSA_size(rsa.get())]); 163 rsa.get(), 192 crypto::ScopedRSA rsa(EVP_PKEY_get1_RSA(private_key->key())); 193 if (!rsa || RSA_size(rsa.get()) == 0) { 194 LOG(ERROR) << "Failed to get RSA key." [all...] |
/external/openssl/crypto/pem/ |
pvkfmt.c | 68 #include <openssl/rsa.h> 114 /* Convert private key blob to EVP_PKEY: RSA and DSA keys supported */ 375 RSA *rsa = NULL; local 379 rsa = RSA_new(); 381 if (!rsa || !ret) 383 rsa->e = BN_new(); 384 if (!rsa->e) 386 if (!BN_set_word(rsa->e, read_ledword(&p))) 388 if (!read_lebn(&p, nbyte, &rsa->n) [all...] |
/external/chromium_org/third_party/boringssl/src/ssl/ |
ssl_rsa.c | 10 * apply to all code found in this distribution, be it the RC4, RSA, 153 int SSL_use_RSAPrivateKey(SSL *ssl, RSA *rsa) 158 if (rsa == NULL) 174 RSA_up_ref(rsa); 175 EVP_PKEY_assign_RSA(pkey,rsa); 226 RSA *rsa=NULL; local 243 rsa=d2i_RSAPrivateKey_bio(in,NULL); 248 rsa=PEM_read_bio_RSAPrivateKey(in,NULL 273 RSA *rsa; local 539 RSA *rsa=NULL; local 586 RSA *rsa; local [all...] |
/external/ipsec-tools/src/racoon/ |
rsalist.c | 46 #include <openssl/rsa.h> 69 struct netaddr *dst, RSA *rsa) 74 rsa_key->rsa = rsa; 100 RSA_print_fp(stdout, key->rsa, 4); 168 plog(LLV_DEBUG, LOCATION, NULL, "Looking up RSA key for %s\n", 200 RSA * 209 if (eay_check_rsasign(source, sig, key->rsa) == 0) { 211 return key->rsa; [all...] |
/external/chromium_org/net/ssl/ |
openssl_platform_key_mac.cc | 9 #include <openssl/rsa.h> 93 // RSA and ECDSA objects that are created to wrap Mac system keys. 102 // ExDataDup is called when one of the RSA or EC_KEY objects is 114 // ExDataFree is called when one of the RSA or EC_KEY objects is freed. 124 // BoringSSLEngine is a BoringSSL ENGINE that implements RSA and ECDSA 177 OPENSSL_PUT_ERROR(RSA, sign_raw, ERR_R_INTERNAL_ERROR); 199 // Set RSA blinding. 231 const KeyExData* RsaGetExData(const RSA* rsa) { 233 RSA_get_ex_data(rsa, global_boringssl_engine.Get().rsa_ex_index())) [all...] |
/external/chromium_org/third_party/boringssl/src/crypto/x509/ |
x_all.c | 10 * apply to all code found in this distribution, be it the RC4, RSA, 62 #include <openssl/rsa.h> 238 RSA *d2i_RSAPrivateKey_fp(FILE *fp, RSA **rsa) 240 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(RSAPrivateKey), fp, rsa); 243 int i2d_RSAPrivateKey_fp(FILE *fp, RSA *rsa) 245 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(RSAPrivateKey), fp, rsa); 248 RSA *d2i_RSAPublicKey_fp(FILE *fp, RSA **rsa [all...] |
/external/openssl/crypto/x509/ |
x_all.c | 11 * apply to all code found in this distribution, be it the RC4, RSA, 67 #include <openssl/rsa.h> 229 RSA *d2i_RSAPrivateKey_fp(FILE *fp, RSA **rsa) 231 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(RSAPrivateKey), fp, rsa); 234 int i2d_RSAPrivateKey_fp(FILE *fp, RSA *rsa) 236 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(RSAPrivateKey), fp, rsa); 239 RSA *d2i_RSAPublicKey_fp(FILE *fp, RSA **rsa [all...] |
/external/chromium_org/net/android/ |
keystore_openssl.cc | 14 #include <openssl/rsa.h> 36 // Internally, it can hold a pointer to a RSA, DSA or ECDSA structure, 40 // The RSA type has a 'method' field pointer to a vtable-like structure 42 // correspond to operations on RSA keys (e.g. decode/encode with public 48 // signing operation using the other fields in the RSA structure (which 54 // RSA operation using platform Android APIs. 57 // be stored in the RSA instance, or made accessible when the custom RSA 72 // KeyExData contains the data that is contained in the EX_DATA of the RSA, DSA 77 // legacy_rsa, if not NULL, points to an RSA* in the system's OpenSSL (whic [all...] |
/external/chromium_org/net/data/ssl/scripts/ |
generate-bad-eku-certs.sh | 20 eku_test_root="2048-rsa-root" 31 CA_COMMON_NAME="2048 RSA Test Root CA" \ 35 ALGO=rsa \ 44 CA_COMMON_NAME="2048 RSA Test Root CA" \ 68 CA_COMMON_NAME="2048 rsa Test Root CA" \ 72 ALGO=rsa \
|
/external/openssl/ |
Crypto-config-trusty.mk | 169 crypto/rsa/rsa_ameth.c \ 170 crypto/rsa/rsa_asn1.c \ 171 crypto/rsa/rsa_chk.c \ 172 crypto/rsa/rsa_crpt.c \ 173 crypto/rsa/rsa_eay.c \ 174 crypto/rsa/rsa_gen.c \ 175 crypto/rsa/rsa_lib.c \ 176 crypto/rsa/rsa_none.c \ 177 crypto/rsa/rsa_oaep.c \ 178 crypto/rsa/rsa_pk1.c [all...] |
/external/openssl/crypto/asn1/ |
d2i_pu.c | 11 * apply to all code found in this distribution, be it the RC4, RSA, 66 #include <openssl/rsa.h> 100 if ((ret->pkey.rsa=d2i_RSAPublicKey(NULL,
|