HomeSort by relevance Sort by last modified time
    Searched refs:RSA (Results 1 - 25 of 140) sorted by null

1 2 3 4 5 6

  /external/boringssl/src/include/openssl/
rsa.h 10 * apply to all code found in this distribution, be it the RC4, RSA,
72 /* rsa.h contains functions for handling encryption and signature using RSA. */
77 /* RSA_new returns a new, empty RSA object or NULL on error. */
78 OPENSSL_EXPORT RSA *RSA_new(void);
81 OPENSSL_EXPORT RSA *RSA_new_method(const ENGINE *engine);
83 /* RSA_free decrements the reference count of |rsa| and frees it if the
85 OPENSSL_EXPORT void RSA_free(RSA *rsa);
87 /* RSA_up_ref increments the reference count of |rsa|. *
    [all...]
  /external/boringssl/src/crypto/rsa/
rsa_asn1.c 56 #include <openssl/rsa.h>
90 /* An RSA object may be missing some components. */
91 OPENSSL_PUT_ERROR(RSA, RSA_R_VALUE_MISSING);
97 static RSA *parse_public_key(CBS *cbs, int buggy) {
98 RSA *ret = RSA_new();
107 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_ENCODING);
114 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_RSA_PARAMETERS);
122 RSA *RSA_parse_public_key(CBS *cbs) {
126 RSA *RSA_parse_public_key_buggy(CBS *cbs) {
134 RSA *RSA_public_key_from_bytes(const uint8_t *in, size_t in_len)
    [all...]
rsa.c 10 * apply to all code found in this distribution, be it the RC4, RSA,
57 #include <openssl/rsa.h>
76 RSA *RSA_new(void) { return RSA_new_method(NULL); }
78 RSA *RSA_new_method(const ENGINE *engine) {
79 RSA *rsa = (RSA *)OPENSSL_malloc(sizeof(RSA)); local
80 if (rsa == NULL) {
81 OPENSSL_PUT_ERROR(RSA, ERR_R_MALLOC_FAILURE)
    [all...]
internal.h 10 * apply to all code found in this distribution, be it the RC4, RSA,
68 /* Default implementations of RSA operations. */
72 size_t rsa_default_size(const RSA *rsa);
73 int rsa_default_encrypt(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out,
75 int rsa_default_sign_raw(RSA *rsa, size_t *out_len, uint8_t *out,
78 int rsa_default_decrypt(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out
    [all...]
padding.c 56 #include <openssl/rsa.h>
79 OPENSSL_PUT_ERROR(RSA, RSA_R_KEY_SIZE_TOO_SMALL);
84 OPENSSL_PUT_ERROR(RSA, RSA_R_DATA_TOO_LARGE_FOR_KEY_SIZE);
108 OPENSSL_PUT_ERROR(RSA, RSA_R_DATA_TOO_SMALL);
114 OPENSSL_PUT_ERROR(RSA, RSA_R_BLOCK_TYPE_IS_NOT_01);
127 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_FIXED_HEADER_DECRYPT);
135 OPENSSL_PUT_ERROR(RSA, RSA_R_NULL_BEFORE_BLOCK_MISSING);
140 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_PAD_BYTE_COUNT);
146 OPENSSL_PUT_ERROR(RSA, RSA_R_DATA_TOO_LARGE);
160 OPENSSL_PUT_ERROR(RSA, RSA_R_KEY_SIZE_TOO_SMALL)
    [all...]
rsa_impl.c 10 * apply to all code found in this distribution, be it the RC4, RSA,
57 #include <openssl/rsa.h>
76 size_t rsa_default_size(const RSA *rsa) {
77 return BN_num_bytes(rsa->n);
80 int rsa_default_encrypt(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out,
82 const unsigned rsa_size = RSA_size(rsa);
89 OPENSSL_PUT_ERROR(RSA, RSA_R_MODULUS_TOO_LARGE);
94 OPENSSL_PUT_ERROR(RSA, RSA_R_OUTPUT_BUFFER_TOO_SMALL)
    [all...]
blinding.c 62 * apply to all code found in this distribution, be it the RC4, RSA,
109 #include <openssl/rsa.h>
142 OPENSSL_PUT_ERROR(RSA, ERR_R_MALLOC_FAILURE);
195 OPENSSL_PUT_ERROR(RSA, RSA_R_BN_NOT_INITIALIZED);
235 OPENSSL_PUT_ERROR(RSA, RSA_R_BN_NOT_INITIALIZED);
271 OPENSSL_PUT_ERROR(RSA, RSA_R_BN_NOT_INITIALIZED);
333 /* this should almost never happen for good RSA keys */
336 OPENSSL_PUT_ERROR(RSA, RSA_R_TOO_MANY_ITERATIONS);
402 BN_BLINDING *rsa_setup_blinding(RSA *rsa, BN_CTX *in_ctx)
    [all...]
  /external/ipsec-tools/src/racoon/
rsalist.h 38 #include <openssl/rsa.h>
52 RSA *rsa; member in struct:rsa_key
55 int rsa_key_insert(struct genlist *list, struct netaddr *src, struct netaddr *dst, RSA *rsa);
59 RSA *rsa_try_check_rsasign(vchar_t *source, vchar_t *sig, struct genlist *list);
prsa_par.h 96 RSA *rsa; member in union:YYSTYPE
  /system/keymaster/
rsa_key.h 20 #include <openssl/rsa.h>
39 void operator()(RSA* p) { RSA_free(p); }
42 RSA* key() const { return rsa_key_.get(); }
45 RsaKey(RSA* rsa, const AuthorizationSet& hw_enforced, const AuthorizationSet& sw_enforced,
47 : AsymmetricKey(hw_enforced, sw_enforced, error), rsa_key_(rsa) {}
50 UniquePtr<RSA, RSA_Delete> rsa_key_;
keymaster0_engine.h 25 #include <openssl/rsa.h>
34 /* Keymaster0Engine is a BoringSSL ENGINE that implements RSA & EC by forwarding the requested
56 RSA* BlobToRsaKey(const KeymasterKeyBlob& blob) const;
59 const keymaster_key_blob_t* RsaKeyToBlob(const RSA* rsa) const;
60 const keymaster_key_blob_t* EcKeyToBlob(const EC_KEY* rsa) const;
74 static int rsa_private_transform(RSA* rsa, uint8_t* out, const uint8_t* in, size_t len);
87 int RsaPrivateTransform(RSA* rsa, uint8_t* out, const uint8_t* in, size_t len) const
    [all...]
keymaster1_engine.h 25 #include <openssl/rsa.h>
71 RSA* BuildRsaKey(const KeymasterKeyBlob& blob, const AuthorizationSet& additional_params,
77 KeyData* GetData(const RSA* rsa) const;
78 KeyData* GetData(const EC_KEY* rsa) const;
103 static int rsa_sign_raw(RSA* rsa, size_t* out_len, uint8_t* out, size_t max_out,
105 static int rsa_decrypt(RSA* rsa, size_t* out_len, uint8_t* out, size_t max_out,
  /external/boringssl/src/crypto/pem/
pem_all.c 10 * apply to all code found in this distribution, be it the RC4, RSA,
117 #include <openssl/rsa.h>
121 static RSA *pkey_get_rsa(EVP_PKEY *key, RSA **rsa);
134 /* We treat RSA or DSA private keys as a special case.
142 static RSA *pkey_get_rsa(EVP_PKEY *key, RSA **rsa)
144 RSA *rtmp
    [all...]
  /system/webservd/webservd/
utils.h 36 // Generates an RSA public-private key pair of the specified strength.
37 std::unique_ptr<RSA, void(*)(RSA*)> GenerateRSAKeyPair(int key_length_bits);
41 brillo::SecureBlob StoreRSAPrivateKey(RSA* rsa_key_pair);
43 // Checks if the buffer |key| contains a valid RSA private key.
utils.cc 22 #include <openssl/rsa.h>
84 std::unique_ptr<RSA, void(*)(RSA*)> GenerateRSAKeyPair(int key_length_bits) {
85 // Create RSA key pair.
86 auto rsa_key_pair = std::unique_ptr<RSA, void(*)(RSA*)>{RSA_new(), RSA_free};
96 brillo::SecureBlob StoreRSAPrivateKey(RSA* rsa_key_pair) {
114 std::unique_ptr<RSA, void(*)(RSA*)> rsa_key{
  /external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/rsa/
pem.py 20 from rsa._compat import b, is_bytes
37 @param pem_marker: the marker of the PEM content, such as 'RSA PRIVATE KEY'
38 when your file has '-----BEGIN RSA PRIVATE KEY-----' and
39 '-----END RSA PRIVATE KEY-----' markers.
99 @param pem_marker: the marker of the PEM content, such as 'RSA PRIVATE KEY'
100 when your file has '-----BEGIN RSA PRIVATE KEY-----' and
101 '-----END RSA PRIVATE KEY-----' markers.
  /external/boringssl/src/decrepit/rsa/
rsa_decrepit.c 10 * apply to all code found in this distribution, be it the RC4, RSA,
57 #include <openssl/rsa.h>
64 RSA *RSA_generate_key(int bits, unsigned long e_value, void *callback,
69 RSA *rsa = RSA_new(); local
72 if (rsa == NULL ||
75 !RSA_generate_key_ex(rsa, bits, e, NULL)) {
80 return rsa;
84 RSA_free(rsa);
  /external/vboot_reference/host/lib/include/
host_key.h 15 typedef struct rsa_st RSA;
19 RSA* rsa_private_key; /* Private key data */
  /external/chromium-trace/catapult/third_party/gsutil/third_party/pyasn1-modules/test/
pkcs1.sh 16 -----BEGIN RSA PRIVATE KEY-----
24 -----END RSA PRIVATE KEY-----
  /system/security/keystore-engine/
methods.h 47 void operator()(RSA* p) const {
51 typedef UniquePtr<RSA, struct RSA_Delete> Unique_RSA;
72 /* RSA */
  /bootable/recovery/
verifier.h 24 #include <openssl/rsa.h>
28 void operator()(RSA* rsa) {
29 RSA_free(rsa);
47 std::unique_ptr<RSA, RSADeleter>&& rsa_,
51 rsa(std::move(rsa_)),
57 std::unique_ptr<RSA, RSADeleter> rsa; member in struct:Certificate
  /external/boringssl/src/crypto/x509/
x_all.c 10 * apply to all code found in this distribution, be it the RC4, RSA,
62 #include <openssl/rsa.h>
202 RSA *d2i_RSAPrivateKey_fp(FILE *fp, RSA **rsa)
204 return ASN1_d2i_fp_of(RSA, RSA_new, d2i_RSAPrivateKey, fp, rsa);
207 int i2d_RSAPrivateKey_fp(FILE *fp, RSA *rsa)
209 return ASN1_i2d_fp_of_const(RSA, i2d_RSAPrivateKey, fp, rsa)
    [all...]
  /external/google-tv-pairing-protocol/cpp/tests/polo/util/
certificateutiltest.cc 56 std::string rsa_string = "-----BEGIN RSA PRIVATE KEY-----\n"
70 "-----END RSA PRIVATE KEY-----\n";
73 RSA* rsa = PEM_read_bio_RSAPrivateKey(rsa_bio, NULL, NULL, NULL); local
76 EVP_PKEY_assign_RSA(pkey, rsa);
116 std::string pem = "-----BEGIN RSA PRIVATE KEY-----\n"
133 "-----END RSA PRIVATE KEY-----\n";
139 RSA* rsa = EVP_PKEY_get1_RSA(pkey); local
140 ASSERT_TRUE(rsa);
148 RSA* rsa = RSA_generate_key(1025, RSA_F4, NULL, NULL); local
    [all...]
  /external/vboot_reference/scripts/
genpadding.sh 8 # various combinations of RSA key lengths and message digest algorithms.
45 * arrays corresponding to various combinations of algorithms for RSA signatures.
56 * PKCS 1.5 padding (from the RSA PKCS#1 v2.1 standard)
58 * Depending on the RSA key size and hash function, the padding is calculated
73 * PS: octet string consisting of {Length(RSA Key) - Length(T) - 3} 0xFF
  /libcore/benchmarks/src/benchmarks/regression/
KeyPairGeneratorBenchmark.java 29 RSA,

Completed in 590 milliseconds

1 2 3 4 5 6