HomeSort by relevance Sort by last modified time
    Searched refs:RSA (Results 76 - 100 of 140) sorted by null

1 2 34 5 6

  /external/boringssl/src/ssl/
ssl_file.c 10 * apply to all code found in this distribution, be it the RC4, RSA,
343 RSA *rsa = NULL; local
358 rsa = d2i_RSAPrivateKey_bio(in, NULL);
361 rsa =
369 if (rsa == NULL) {
373 ret = SSL_use_RSAPrivateKey(ssl, rsa);
374 RSA_free(rsa);
466 RSA *rsa = NULL local
    [all...]
  /external/boringssl/src/crypto/obj/
obj_dat.pl 190 * apply to all code found in this distribution, be it the RC4, RSA,
objects.pl 141 * apply to all code found in this distribution, be it the RC4, RSA,
  /external/vboot_reference/host/lib/
host_key.c 26 RSA* rsa_key;
135 VbExError("Unable to parse RSA private key\n");
  /external/webrtc/talk/app/webrtc/java/src/org/webrtc/
PeerConnection.java 135 RSA, ECDSA
  /external/webrtc/webrtc/base/
sslidentity.cc 35 const char kPemTypeRsaPrivateKey[] = "RSA PRIVATE KEY";
44 params_.rsa.mod_size = kRsaDefaultModSize;
45 params_.rsa.pub_exp = kRsaDefaultExponent;
52 KeyParams KeyParams::RSA(int mod_size, int pub_exp) {
54 kt.params_.rsa.mod_size = mod_size;
55 kt.params_.rsa.pub_exp = pub_exp;
68 return (params_.rsa.mod_size >= kRsaMinModSize &&
69 params_.rsa.mod_size <= kRsaMaxModSize &&
70 params_.rsa.pub_exp > params_.rsa.mod_size)
    [all...]
opensslidentity.cc 22 #include <openssl/rsa.h>
52 RSA* rsa = RSA_new(); local
53 if (!pkey || !exponent || !rsa ||
55 !RSA_generate_key_ex(rsa, key_length, exponent, NULL) ||
56 !EVP_PKEY_assign_RSA(pkey, rsa)) {
59 RSA_free(rsa);
60 LOG(LS_ERROR) << "Failed to make RSA key pair";
63 // ownership of rsa struct was assigned, don't free it.
  /system/extras/verity/
verify_boot_signature.c 35 #include <openssl/rsa.h>
308 * Verifies the RSA signature
317 RSA *rsa = NULL; local
333 if ((rsa = EVP_PKEY_get1_RSA(pkey)) == NULL) {
339 bs->signature->data, bs->signature->length, rsa)) {
351 if (rsa) {
352 RSA_free(rsa);
  /system/update_engine/payload_consumer/
payload_verifier.cc 34 // form a sequence of 256 bytes (2048 bits) that is amenable to RSA signing. The
148 RSA* rsa = PEM_read_RSA_PUBKEY(fpubkey, nullptr, nullptr, dummy_password); local
150 TEST_AND_RETURN_FALSE(rsa != nullptr);
151 unsigned int keysize = RSA_size(rsa);
154 RSA_free(rsa);
163 rsa,
165 RSA_free(rsa);
  /external/ipsec-tools/src/racoon/
crypto_openssl.c 979 res = eay_rsa_verify(source, sig, evp->pkey.rsa);
988 * check RSA signature
993 eay_check_rsasign(source, sig, rsa)
996 RSA *rsa;
998 return eay_rsa_verify(source, sig, rsa);
1134 sig = eay_rsa_sign(src, evp->pkey.rsa);
1142 eay_get_rsasign(src, rsa)
1144 RSA *rsa;
    [all...]
  /external/llvm/lib/Target/Hexagon/
HexagonSplitDouble.cpp 610 unsigned RSA = getRegState(AdrOp);
621 .addReg(AdrOp.getReg(), RSA & ~RegState::Kill, AdrOp.getSubReg())
624 .addReg(AdrOp.getReg(), RSA & ~RegState::Kill, AdrOp.getSubReg())
630 .addReg(AdrOp.getReg(), RSA & ~RegState::Kill, AdrOp.getSubReg())
634 .addReg(AdrOp.getReg(), RSA & ~RegState::Kill, AdrOp.getSubReg())
648 .addReg(AdrOp.getReg(), RSA)
    [all...]
  /external/boringssl/src/tool/
speed.cc 29 #include <openssl/rsa.h>
133 static bool SpeedRSA(const std::string &key_name, RSA *key,
480 RSA *key = RSA_private_key_from_bytes(kDERRSAPrivate2048,
483 fprintf(stderr, "Failed to parse RSA key.\n");
488 if (!SpeedRSA("RSA 2048", key, selected)) {
496 fprintf(stderr, "Failed to parse RSA key.\n");
501 if (!SpeedRSA("RSA 2048 (3 prime, e=3)", key, selected)) {
509 fprintf(stderr, "Failed to parse 4096-bit RSA key.\n");
514 if (!SpeedRSA("RSA 4096", key, selected)) {
  /external/v8/benchmarks/
crypto.js 40 // Basic JavaScript BN library - subset useful for RSA encryption.
673 // Extended JavaScript BN functions, required for RSA private ops.
    [all...]
  /external/v8/test/mjsunit/
md5.js 28 // A JavaScript implementation of the RSA Data Security, Inc. MD5 Message
  /system/keymaster/
rsa_operation.cpp 79 UniquePtr<EVP_PKEY, EVP_PKEY_Delete> rsa(GetRsaKey(key, error));
80 if (!rsa.get())
83 RsaOperation* op = InstantiateOperation(digest, padding, rsa.release());
166 LOG_E("Input too long: cannot operate on %u bytes of data with %u-byte RSA key",
250 LOG_E("Input too long: %d-byte digest cannot be used with %d-byte RSA key in PSS "
323 UniquePtr<RSA, RSA_Delete> rsa(EVP_PKEY_get1_RSA(const_cast<EVP_PKEY*>(rsa_key_)));
324 if (!rsa.get())
327 if (!output->Reinitialize(RSA_size(rsa.get())))
344 bytes_encrypted = RSA_private_encrypt(key_len, to_encrypt, output->peek_write(), rsa.get()
    [all...]
  /system/security/softkeymaster/
keymaster_openssl.cpp 28 #include <openssl/rsa.h>
71 void operator()(RSA* p) const { RSA_free(p); }
73 typedef UniquePtr<RSA, RSA_Delete> Unique_RSA;
343 /* initialize RSA */
344 Unique_RSA rsa(RSA_new());
345 if (rsa.get() == NULL) {
350 if (!RSA_generate_key_ex(rsa.get(), rsa_params->modulus_size, bn.get(), NULL) ||
351 RSA_check_key(rsa.get()) < 0) {
356 if (EVP_PKEY_assign_RSA(pkey, rsa.get()) == 0) {
360 release_because_ownership_transferred(rsa);
    [all...]
  /external/conscrypt/src/main/native/
org_conscrypt_NativeCrypto.cpp 52 #include <openssl/rsa.h>
107 * "RSA Session-ID:... Master-Key:..." <CR>
108 * "RSA Session-ID:... Master-Key:..." <CR>
258 void operator()(RSA* p) const {
262 typedef UniquePtr<RSA, RSA_Delete> Unique_RSA;
    [all...]
  /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/lib2to3/tests/data/
infinite_recursion.py 619 ('rsa', POINTER(rsa_st)),
    [all...]
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/lib2to3/tests/data/
infinite_recursion.py 619 ('rsa', POINTER(rsa_st)),
    [all...]
  /external/boringssl/src/include/openssl/
ssl.h 10 * apply to all code found in this distribution, be it the RC4, RSA,
    [all...]
  /external/nanohttpd/
README.md 241 keytool -genkey -keyalg RSA -alias selfsigned -keystore keystore.jks -storepass password -validity 360 -keysize 2048 -ext SAN=DNS:localhost,IP:127.0.0.1 -validity 9999
  /external/nanohttpd/src/site/markdown/
index.md 237 keytool -genkey -keyalg RSA -alias selfsigned -keystore keystore.jks -storepass password -validity 360 -keysize 2048 -ext SAN=DNS:localhost,IP:127.0.0.1 -validity 9999
  /external/v8/test/webkit/fast/js/kde/
md5-1.js 30 * Javascript implementation of the RSA Data Security, Inc. MD5
md5-2.js 28 * A JavaScript implementation of the RSA Data Security, Inc. MD5 Message
  /frameworks/base/keystore/java/android/security/keystore/
AndroidKeyStoreKeyPairGeneratorSpi.java 94 public static class RSA extends AndroidKeyStoreKeyPairGeneratorSpi {
95 public RSA() {
113 /* RSA */
394 throw new InvalidAlgorithmParameterException("RSA key size must match "
401 "RSA may only use RSAKeyGenParameterSpec");
408 "RSA public exponent must be positive: " + publicExponent);
412 "Unsupported RSA public exponent: " + publicExponent
    [all...]

Completed in 2009 milliseconds

1 2 34 5 6