/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/func/ |
CipherRSATest.java | 23 CipherRSAThread rsa = new CipherRSAThread("RSA", new int[] {512}, local 28 rsa.launcher(); 30 assertEquals(rsa.getFailureMessages(), 0, rsa.getTotalFailuresNumber()); 35 CipherRSAThread rsa = new CipherRSAThread("RSA", new int[] {1024}, local 40 rsa.launcher(); 42 assertEquals(rsa.getFailureMessages(), 0, rsa.getTotalFailuresNumber()) 47 CipherRSAThread rsa = new CipherRSAThread("RSA", new int[] {2048}, local 57 CipherRSAThread rsa = new CipherRSAThread("RSA", new int[] {1024}, local [all...] |
/external/openssl/crypto/rsa/ |
rsa_gen.c | 1 /* crypto/rsa/rsa_gen.c */ 11 * apply to all code found in this distribution, be it the RC4, RSA, 69 #include <openssl/rsa.h> 74 static int rsa_builtin_keygen(RSA *rsa, int bits, BIGNUM *e_value, BN_GENCB *cb); 81 int RSA_generate_key_ex(RSA *rsa, int bits, BIGNUM *e_value, BN_GENCB *cb) 84 if (FIPS_mode() && !(rsa->meth->flags & RSA_FLAG_FIPS_METHOD) 85 && !(rsa->flags & RSA_FLAG_NON_FIPS_ALLOW)) 91 if(rsa->meth->rsa_keygen [all...] |
rsa_null.c | 62 #include <openssl/rsa.h> 65 /* This is a dummy RSA implementation that just returns errors when called. 66 * It is designed to allow some RSA functions to work while stopping those 67 * covered by the RSA patent. That is RSA, encryption, decryption, signing 68 * and verify is not allowed but RSA key generation, key checking and other 69 * operations (like storing RSA keys) are permitted. 73 unsigned char *to, RSA *rsa,int padding); 75 unsigned char *to, RSA *rsa,int padding) [all...] |
rsa_crpt.c | 1 /* crypto/rsa/rsa_lib.c */ 11 * apply to all code found in this distribution, be it the RC4, RSA, 64 #include <openssl/rsa.h> 70 int RSA_size(const RSA *r) 76 RSA *rsa, int padding) 79 if (FIPS_mode() && !(rsa->meth->flags & RSA_FLAG_FIPS_METHOD) 80 && !(rsa->flags & RSA_FLAG_NON_FIPS_ALLOW)) 86 return(rsa->meth->rsa_pub_enc(flen, from, to, rsa, padding)) [all...] |
rsa_depr.c | 1 /* crypto/rsa/rsa_depr.c */ 63 #include <openssl/rsa.h> 71 RSA *RSA_generate_key(int bits, unsigned long e_value, 76 RSA *rsa = RSA_new(); local 79 if(!rsa || !e) goto err; 92 if(RSA_generate_key_ex(rsa, bits, e, &cb)) { 94 return rsa; 98 if(rsa) RSA_free(rsa); [all...] |
rsa_eay.c | 1 /* crypto/rsa/rsa_eay.c */ 11 * apply to all code found in this distribution, be it the RC4, RSA, 115 #include <openssl/rsa.h> 121 unsigned char *to, RSA *rsa,int padding); 123 unsigned char *to, RSA *rsa,int padding); 125 unsigned char *to, RSA *rsa,int padding); 127 unsigned char *to, RSA *rsa,int padding) [all...] |
rsa_locl.h | 4 RSA *rsa);
|
rsa_sign.c | 1 /* crypto/rsa/rsa_sign.c */ 11 * apply to all code found in this distribution, be it the RC4, RSA, 62 #include <openssl/rsa.h> 71 unsigned char *sigret, unsigned int *siglen, RSA *rsa) 81 if (FIPS_mode() && !(rsa->meth->flags & RSA_FLAG_FIPS_METHOD) 82 && !(rsa->flags & RSA_FLAG_NON_FIPS_ALLOW)) 88 if((rsa->flags & RSA_FLAG_SIGN_VER) && rsa->meth->rsa_sign) 90 return rsa->meth->rsa_sign(type, m, m_len [all...] |
rsa_saos.c | 1 /* crypto/rsa/rsa_saos.c */ 11 * apply to all code found in this distribution, be it the RC4, RSA, 62 #include <openssl/rsa.h> 68 unsigned char *sigret, unsigned int *siglen, RSA *rsa) 79 j=RSA_size(rsa); 93 i=RSA_private_encrypt(i,s,sigret,rsa,RSA_PKCS1_PADDING); 107 RSA *rsa) 114 if (siglen != (unsigned int)RSA_size(rsa)) [all...] |
rsa.h | 1 /* crypto/rsa/rsa.h */ 11 * apply to all code found in this distribution, be it the RC4, RSA, 74 #error RSA is disabled. 82 /* typedef struct rsa_st RSA; */ 90 RSA *rsa,int padding); 93 RSA *rsa,int padding); 96 RSA *rsa,int padding) [all...] |
/external/chromium_org/third_party/boringssl/src/crypto/rsa/ |
rsa_impl.c | 10 * apply to all code found in this distribution, be it the RC4, RSA, 57 #include <openssl/rsa.h> 72 static int finish(RSA *rsa) { 73 if (rsa->_method_mod_n != NULL) { 74 BN_MONT_CTX_free(rsa->_method_mod_n); 76 if (rsa->_method_mod_p != NULL) { 77 BN_MONT_CTX_free(rsa->_method_mod_p); 79 if (rsa->_method_mod_q != NULL) { 80 BN_MONT_CTX_free(rsa->_method_mod_q) [all...] |
rsa.c | 10 * apply to all code found in this distribution, be it the RC4, RSA, 57 #include <openssl/rsa.h> 71 RSA *RSA_new(void) { return RSA_new_method(NULL); } 73 RSA *RSA_new_method(const ENGINE *engine) { 74 RSA *rsa = (RSA *)OPENSSL_malloc(sizeof(RSA)); local 75 if (rsa == NULL) { 76 OPENSSL_PUT_ERROR(RSA, RSA_new_method, ERR_R_MALLOC_FAILURE) [all...] |
/external/chromium_org/net/android/ |
legacy_openssl.h | 58 AndroidRSA* rsa, 63 AndroidRSA* rsa, 68 AndroidRSA* rsa, 73 AndroidRSA* rsa, 89 AndroidRSA* rsa; member in union:net::android::AndroidEVP_PKEY::__anon13606
|
/external/chromium_org/third_party/boringssl/src/include/openssl/ |
rsa.h | 10 * apply to all code found in this distribution, be it the RC4, RSA, 70 /* rsa.h contains functions for handling encryption and signature using RSA. */ 75 /* RSA_new returns a new, empty RSA object or NULL on error. */ 76 OPENSSL_EXPORT RSA *RSA_new(void); 79 OPENSSL_EXPORT RSA *RSA_new_method(const ENGINE *engine); 81 /* RSA_free decrements the reference count of |rsa| and frees it if the 83 OPENSSL_EXPORT void RSA_free(RSA *rsa); 85 /* RSA_up_ref increments the reference count of |rsa|. * [all...] |
/external/chromium_org/third_party/tlslite/tlslite/utils/ |
pycrypto_rsakey.py | 4 """PyCrypto RSA implementation.""" 13 from Crypto.PublicKey import RSA 18 self.rsa = RSA.construct( (n, e) ) 20 self.rsa = RSA.construct( (n, e, d, p, q) ) 23 return getattr(self.rsa, name) 26 return self.rsa.has_private() 30 c = bytesToNumber(bytearray(self.rsa.decrypt((s,)))) 35 m = bytesToNumber(bytearray(self.rsa.encrypt(s, None)[0]) [all...] |
openssl_rsakey.py | 4 """OpenSSL/M2Crypto RSA implementation.""" 33 self.rsa = None 38 self.rsa = m2.rsa_new() 39 m2.rsa_set_n(self.rsa, numberToMPI(n)) 40 m2.rsa_set_e(self.rsa, numberToMPI(e)) 43 if self.rsa: 44 m2.rsa_free(self.rsa) 48 if not self.rsa: 50 return mpiToNumber(m2.rsa_get_e(self.rsa)) 52 if not self.rsa [all...] |
/external/ipsec-tools/src/racoon/ |
rsalist.h | 38 #include <openssl/rsa.h> 52 RSA *rsa; member in struct:rsa_key 55 int rsa_key_insert(struct genlist *list, struct netaddr *src, struct netaddr *dst, RSA *rsa); 59 RSA *rsa_try_check_rsasign(vchar_t *source, vchar_t *sig, struct genlist *list);
|
/external/openssl/crypto/asn1/ |
i2d_pu.c | 11 * apply to all code found in this distribution, be it the RC4, RSA, 65 #include <openssl/rsa.h> 80 return(i2d_RSAPublicKey(a->pkey.rsa,pp));
|
/external/openssl/crypto/evp/ |
p_dec.c | 11 * apply to all code found in this distribution, be it the RC4, RSA, 63 #include <openssl/rsa.h> 83 ret=RSA_private_decrypt(ekl,ek,key,priv->pkey.rsa,RSA_PKCS1_PADDING);
|
p_enc.c | 11 * apply to all code found in this distribution, be it the RC4, RSA, 63 #include <openssl/rsa.h> 82 ret=RSA_public_encrypt(key_len,key,ek,pubk->pkey.rsa,RSA_PKCS1_PADDING);
|
/external/chromium_org/content/child/webcrypto/openssl/ |
rsa_key_openssl.cc | 74 crypto::ScopedRSA rsa(EVP_PKEY_get1_RSA(key)); 75 if (!rsa.get()) 78 unsigned int modulus_length_bits = BN_num_bits(rsa.get()->n); 81 std::vector<uint8_t> e(BN_num_bytes(rsa.get()->e)); 84 if (e.size() != BN_bn2bin(rsa.get()->e, &e[0])) 168 crypto::ScopedRSA rsa(RSA_new()); 170 rsa->n = CreateBIGNUM(params.n); 171 rsa->e = CreateBIGNUM(params.e); 172 rsa->d = CreateBIGNUM(params.d); 173 rsa->p = CreateBIGNUM(params.p) [all...] |
/external/chromium_org/third_party/boringssl/src/crypto/evp/ |
p_rsa_asn1.c | 64 #include <openssl/rsa.h> 67 #include "../rsa/internal.h" 74 len = i2d_RSAPublicKey(pkey->pkey.rsa, &encoded); 92 RSA *rsa; local 97 rsa = d2i_RSAPublicKey(NULL, &p, pklen); 98 if (rsa == NULL) { 102 EVP_PKEY_assign_RSA(pkey, rsa); 107 return BN_cmp(b->pkey.rsa->n, a->pkey.rsa->n) == 0 & 135 RSA *rsa; local 432 RSA *rsa = d2i_RSAPrivateKey(NULL, pder, derlen); local [all...] |
/external/openssl/include/openssl/ |
rsa.h | 1 /* crypto/rsa/rsa.h */ 11 * apply to all code found in this distribution, be it the RC4, RSA, 74 #error RSA is disabled. 82 /* typedef struct rsa_st RSA; */ 90 RSA *rsa,int padding); 93 RSA *rsa,int padding); 96 RSA *rsa,int padding) [all...] |
/system/extras/verity/ |
generate_verity_key.c | 26 #include "mincrypt/rsa.h" 32 #include <openssl/rsa.h> 35 // Convert OpenSSL RSA private key to android pre-computed RSAPublicKey format. 37 static int convert_to_mincrypt_format(RSA *rsa, RSAPublicKey *pkey) 42 if (RSA_size(rsa) != RSANUMBYTES) 54 BN_copy(n, rsa->n); 68 pkey->exponent = BN_get_word(rsa->e); 84 static int write_public_keyfile(RSA *private_key, const char *private_key_path) 116 RSA *rsa = NULL local 175 RSA* rsa = RSA_new(); local [all...] |
/system/security/keystore-engine/ |
rsa_meth.cpp | 29 #define LOG_TAG "OpenSSL-keystore-rsa" 35 #include <openssl/rsa.h> 44 int keystore_rsa_priv_enc(int flen, const unsigned char* from, unsigned char* to, RSA* rsa, 46 ALOGV("keystore_rsa_priv_enc(%d, %p, %p, %p, %d)", flen, from, to, rsa, padding); 48 int num = RSA_size(rsa); 76 uint8_t* key_id = reinterpret_cast<uint8_t*>(RSA_get_ex_data(rsa, rsa_key_handle)); 111 ALOGV("rsa=%p keystore_rsa_priv_enc => returning %p len %llu", rsa, to, 116 int keystore_rsa_priv_dec(int flen, const unsigned char* from, unsigned char* to, RSA* rsa [all...] |