/external/boringssl/src/include/openssl/ |
rsa.h | 10 * apply to all code found in this distribution, be it the RC4, RSA, 72 /* rsa.h contains functions for handling encryption and signature using RSA. */ 77 /* RSA_new returns a new, empty RSA object or NULL on error. */ 78 OPENSSL_EXPORT RSA *RSA_new(void); 81 OPENSSL_EXPORT RSA *RSA_new_method(const ENGINE *engine); 83 /* RSA_free decrements the reference count of |rsa| and frees it if the 85 OPENSSL_EXPORT void RSA_free(RSA *rsa); 87 /* RSA_up_ref increments the reference count of |rsa|. * [all...] |
/external/boringssl/src/crypto/rsa/ |
rsa_asn1.c | 56 #include <openssl/rsa.h> 90 /* An RSA object may be missing some components. */ 91 OPENSSL_PUT_ERROR(RSA, RSA_R_VALUE_MISSING); 97 static RSA *parse_public_key(CBS *cbs, int buggy) { 98 RSA *ret = RSA_new(); 107 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_ENCODING); 114 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_RSA_PARAMETERS); 122 RSA *RSA_parse_public_key(CBS *cbs) { 126 RSA *RSA_parse_public_key_buggy(CBS *cbs) { 134 RSA *RSA_public_key_from_bytes(const uint8_t *in, size_t in_len) [all...] |
rsa.c | 10 * apply to all code found in this distribution, be it the RC4, RSA, 57 #include <openssl/rsa.h> 76 RSA *RSA_new(void) { return RSA_new_method(NULL); } 78 RSA *RSA_new_method(const ENGINE *engine) { 79 RSA *rsa = (RSA *)OPENSSL_malloc(sizeof(RSA)); local 80 if (rsa == NULL) { 81 OPENSSL_PUT_ERROR(RSA, ERR_R_MALLOC_FAILURE) [all...] |
internal.h | 10 * apply to all code found in this distribution, be it the RC4, RSA, 68 /* Default implementations of RSA operations. */ 72 size_t rsa_default_size(const RSA *rsa); 73 int rsa_default_encrypt(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out, 75 int rsa_default_sign_raw(RSA *rsa, size_t *out_len, uint8_t *out, 78 int rsa_default_decrypt(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out [all...] |
padding.c | 56 #include <openssl/rsa.h> 79 OPENSSL_PUT_ERROR(RSA, RSA_R_KEY_SIZE_TOO_SMALL); 84 OPENSSL_PUT_ERROR(RSA, RSA_R_DATA_TOO_LARGE_FOR_KEY_SIZE); 108 OPENSSL_PUT_ERROR(RSA, RSA_R_DATA_TOO_SMALL); 114 OPENSSL_PUT_ERROR(RSA, RSA_R_BLOCK_TYPE_IS_NOT_01); 127 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_FIXED_HEADER_DECRYPT); 135 OPENSSL_PUT_ERROR(RSA, RSA_R_NULL_BEFORE_BLOCK_MISSING); 140 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_PAD_BYTE_COUNT); 146 OPENSSL_PUT_ERROR(RSA, RSA_R_DATA_TOO_LARGE); 160 OPENSSL_PUT_ERROR(RSA, RSA_R_KEY_SIZE_TOO_SMALL) [all...] |
rsa_impl.c | 10 * apply to all code found in this distribution, be it the RC4, RSA, 57 #include <openssl/rsa.h> 76 size_t rsa_default_size(const RSA *rsa) { 77 return BN_num_bytes(rsa->n); 80 int rsa_default_encrypt(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out, 82 const unsigned rsa_size = RSA_size(rsa); 89 OPENSSL_PUT_ERROR(RSA, RSA_R_MODULUS_TOO_LARGE); 94 OPENSSL_PUT_ERROR(RSA, RSA_R_OUTPUT_BUFFER_TOO_SMALL) [all...] |
blinding.c | 62 * apply to all code found in this distribution, be it the RC4, RSA, 109 #include <openssl/rsa.h> 142 OPENSSL_PUT_ERROR(RSA, ERR_R_MALLOC_FAILURE); 195 OPENSSL_PUT_ERROR(RSA, RSA_R_BN_NOT_INITIALIZED); 235 OPENSSL_PUT_ERROR(RSA, RSA_R_BN_NOT_INITIALIZED); 271 OPENSSL_PUT_ERROR(RSA, RSA_R_BN_NOT_INITIALIZED); 333 /* this should almost never happen for good RSA keys */ 336 OPENSSL_PUT_ERROR(RSA, RSA_R_TOO_MANY_ITERATIONS); 402 BN_BLINDING *rsa_setup_blinding(RSA *rsa, BN_CTX *in_ctx) [all...] |
/external/ipsec-tools/src/racoon/ |
rsalist.h | 38 #include <openssl/rsa.h> 52 RSA *rsa; member in struct:rsa_key 55 int rsa_key_insert(struct genlist *list, struct netaddr *src, struct netaddr *dst, RSA *rsa); 59 RSA *rsa_try_check_rsasign(vchar_t *source, vchar_t *sig, struct genlist *list);
|
prsa_par.h | 96 RSA *rsa; member in union:YYSTYPE
|
/system/keymaster/ |
rsa_key.h | 20 #include <openssl/rsa.h> 39 void operator()(RSA* p) { RSA_free(p); } 42 RSA* key() const { return rsa_key_.get(); } 45 RsaKey(RSA* rsa, const AuthorizationSet& hw_enforced, const AuthorizationSet& sw_enforced, 47 : AsymmetricKey(hw_enforced, sw_enforced, error), rsa_key_(rsa) {} 50 UniquePtr<RSA, RSA_Delete> rsa_key_;
|
keymaster0_engine.h | 25 #include <openssl/rsa.h> 34 /* Keymaster0Engine is a BoringSSL ENGINE that implements RSA & EC by forwarding the requested 56 RSA* BlobToRsaKey(const KeymasterKeyBlob& blob) const; 59 const keymaster_key_blob_t* RsaKeyToBlob(const RSA* rsa) const; 60 const keymaster_key_blob_t* EcKeyToBlob(const EC_KEY* rsa) const; 74 static int rsa_private_transform(RSA* rsa, uint8_t* out, const uint8_t* in, size_t len); 87 int RsaPrivateTransform(RSA* rsa, uint8_t* out, const uint8_t* in, size_t len) const [all...] |
keymaster1_engine.h | 25 #include <openssl/rsa.h> 71 RSA* BuildRsaKey(const KeymasterKeyBlob& blob, const AuthorizationSet& additional_params, 77 KeyData* GetData(const RSA* rsa) const; 78 KeyData* GetData(const EC_KEY* rsa) const; 103 static int rsa_sign_raw(RSA* rsa, size_t* out_len, uint8_t* out, size_t max_out, 105 static int rsa_decrypt(RSA* rsa, size_t* out_len, uint8_t* out, size_t max_out,
|
/external/boringssl/src/crypto/pem/ |
pem_all.c | 10 * apply to all code found in this distribution, be it the RC4, RSA, 117 #include <openssl/rsa.h> 121 static RSA *pkey_get_rsa(EVP_PKEY *key, RSA **rsa); 134 /* We treat RSA or DSA private keys as a special case. 142 static RSA *pkey_get_rsa(EVP_PKEY *key, RSA **rsa) 144 RSA *rtmp [all...] |
/system/webservd/webservd/ |
utils.h | 36 // Generates an RSA public-private key pair of the specified strength. 37 std::unique_ptr<RSA, void(*)(RSA*)> GenerateRSAKeyPair(int key_length_bits); 41 brillo::SecureBlob StoreRSAPrivateKey(RSA* rsa_key_pair); 43 // Checks if the buffer |key| contains a valid RSA private key.
|
utils.cc | 22 #include <openssl/rsa.h> 84 std::unique_ptr<RSA, void(*)(RSA*)> GenerateRSAKeyPair(int key_length_bits) { 85 // Create RSA key pair. 86 auto rsa_key_pair = std::unique_ptr<RSA, void(*)(RSA*)>{RSA_new(), RSA_free}; 96 brillo::SecureBlob StoreRSAPrivateKey(RSA* rsa_key_pair) { 114 std::unique_ptr<RSA, void(*)(RSA*)> rsa_key{
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/rsa/ |
pem.py | 20 from rsa._compat import b, is_bytes 37 @param pem_marker: the marker of the PEM content, such as 'RSA PRIVATE KEY' 38 when your file has '-----BEGIN RSA PRIVATE KEY-----' and 39 '-----END RSA PRIVATE KEY-----' markers. 99 @param pem_marker: the marker of the PEM content, such as 'RSA PRIVATE KEY' 100 when your file has '-----BEGIN RSA PRIVATE KEY-----' and 101 '-----END RSA PRIVATE KEY-----' markers.
|
/external/boringssl/src/decrepit/rsa/ |
rsa_decrepit.c | 10 * apply to all code found in this distribution, be it the RC4, RSA, 57 #include <openssl/rsa.h> 64 RSA *RSA_generate_key(int bits, unsigned long e_value, void *callback, 69 RSA *rsa = RSA_new(); local 72 if (rsa == NULL || 75 !RSA_generate_key_ex(rsa, bits, e, NULL)) { 80 return rsa; 84 RSA_free(rsa);
|
/external/vboot_reference/host/lib/include/ |
host_key.h | 15 typedef struct rsa_st RSA; 19 RSA* rsa_private_key; /* Private key data */
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/pyasn1-modules/test/ |
pkcs1.sh | 16 -----BEGIN RSA PRIVATE KEY----- 24 -----END RSA PRIVATE KEY-----
|
/system/security/keystore-engine/ |
methods.h | 47 void operator()(RSA* p) const { 51 typedef UniquePtr<RSA, struct RSA_Delete> Unique_RSA; 72 /* RSA */
|
/bootable/recovery/ |
verifier.h | 24 #include <openssl/rsa.h> 28 void operator()(RSA* rsa) { 29 RSA_free(rsa); 47 std::unique_ptr<RSA, RSADeleter>&& rsa_, 51 rsa(std::move(rsa_)), 57 std::unique_ptr<RSA, RSADeleter> rsa; member in struct:Certificate
|
/external/boringssl/src/crypto/x509/ |
x_all.c | 10 * apply to all code found in this distribution, be it the RC4, RSA, 62 #include <openssl/rsa.h> 202 RSA *d2i_RSAPrivateKey_fp(FILE *fp, RSA **rsa) 204 return ASN1_d2i_fp_of(RSA, RSA_new, d2i_RSAPrivateKey, fp, rsa); 207 int i2d_RSAPrivateKey_fp(FILE *fp, RSA *rsa) 209 return ASN1_i2d_fp_of_const(RSA, i2d_RSAPrivateKey, fp, rsa) [all...] |
/external/google-tv-pairing-protocol/cpp/tests/polo/util/ |
certificateutiltest.cc | 56 std::string rsa_string = "-----BEGIN RSA PRIVATE KEY-----\n" 70 "-----END RSA PRIVATE KEY-----\n"; 73 RSA* rsa = PEM_read_bio_RSAPrivateKey(rsa_bio, NULL, NULL, NULL); local 76 EVP_PKEY_assign_RSA(pkey, rsa); 116 std::string pem = "-----BEGIN RSA PRIVATE KEY-----\n" 133 "-----END RSA PRIVATE KEY-----\n"; 139 RSA* rsa = EVP_PKEY_get1_RSA(pkey); local 140 ASSERT_TRUE(rsa); 148 RSA* rsa = RSA_generate_key(1025, RSA_F4, NULL, NULL); local [all...] |
/external/vboot_reference/scripts/ |
genpadding.sh | 8 # various combinations of RSA key lengths and message digest algorithms. 45 * arrays corresponding to various combinations of algorithms for RSA signatures. 56 * PKCS 1.5 padding (from the RSA PKCS#1 v2.1 standard) 58 * Depending on the RSA key size and hash function, the padding is calculated 73 * PS: octet string consisting of {Length(RSA Key) - Length(T) - 3} 0xFF
|
/libcore/benchmarks/src/benchmarks/regression/ |
KeyPairGeneratorBenchmark.java | 29 RSA,
|