HomeSort by relevance Sort by last modified time
    Searched refs:rsa (Results 101 - 125 of 203) sorted by null

1 2 3 45 6 7 8 9

  /system/tpm/trunks/
session_manager_impl.cc 29 #include <openssl/rsa.h>
88 // padded RSA public key encryption. This is specified in TPM2.0
156 public_data.public_area.unique.rsa.size = 0;
168 LOG(ERROR) << "Error creating exponent for RSA: " << GetOpenSSLError();
173 BN_bin2bn(public_data.public_area.unique.rsa.buffer,
174 public_data.public_area.unique.rsa.size, nullptr);
176 LOG(ERROR) << "Error setting public area of rsa key: " << GetOpenSSLError();
trunks_client_test.cc 32 #include <openssl/rsa.h>
437 LOG(ERROR) << "Error creating RSA key: " << GetErrorString(result);
444 LOG(ERROR) << "Error loading RSA key: " << GetErrorString(result);
470 LOG(ERROR) << "Error signing using RSA key: " << GetErrorString(result);
476 LOG(ERROR) << "Error verifying using RSA key: " << GetErrorString(result);
485 LOG(ERROR) << "Error encrypting using RSA key: " << GetErrorString(result);
501 LOG(ERROR) << "Error encrypting using RSA key: " << GetErrorString(result);
566 LOG(ERROR) << "Error creating RSA key: " << GetErrorString(result);
572 LOG(ERROR) << "Error loading RSA key: " << GetErrorString(result);
746 LOG(ERROR) << "Error creating RSA key: " << GetErrorString(result)
    [all...]
  /external/vboot_reference/futility/
vb1_helper.c 12 #include <openssl/rsa.h>
497 RSAPublicKey *rsa; local
557 rsa = PublicKeyToRSA(data_key);
558 if (!rsa) {
565 g_preamble->preamble_size, rsa)) {
615 &g_preamble->body_signature, rsa)) {
724 RSAPublicKey *rsa; local
727 rsa = PublicKeyToRSA(&key_block->data_key);
733 VerifyFirmwarePreamble(fw_preamble, len - more, rsa))
739 VerifyKernelPreamble(kern_preamble, len - more, rsa))
    [all...]
cmd_show.c 328 RSAPublicKey *rsa = PublicKeyToRSA(&key_block->data_key); local
329 if (!rsa) {
338 len - more, rsa)) {
388 VerifyData(fv_data, fv_size, &preamble->body_signature, rsa)) {
441 RSAPublicKey *rsa = PublicKeyToRSA(&key_block->data_key); local
442 if (!rsa) {
451 len - more, rsa)) {
509 &preamble->body_signature, rsa)) {
  /external/webrtc/webrtc/base/
opensslidentity.cc 22 #include <openssl/rsa.h>
52 RSA* rsa = RSA_new(); local
53 if (!pkey || !exponent || !rsa ||
55 !RSA_generate_key_ex(rsa, key_length, exponent, NULL) ||
56 !EVP_PKEY_assign_RSA(pkey, rsa)) {
59 RSA_free(rsa);
60 LOG(LS_ERROR) << "Failed to make RSA key pair";
63 // ownership of rsa struct was assigned, don't free it.
sslidentity.h 140 // Generate a a KeyParams for RSA with explicit parameters.
141 static KeyParams RSA(int mod_size = kRsaDefaultModSize,
161 RSAParams rsa; member in union:rtc::KeyParams::__anon26322
  /external/boringssl/src/crypto/rsa/
padding.c 56 #include <openssl/rsa.h>
79 OPENSSL_PUT_ERROR(RSA, RSA_R_KEY_SIZE_TOO_SMALL);
84 OPENSSL_PUT_ERROR(RSA, RSA_R_DATA_TOO_LARGE_FOR_KEY_SIZE);
108 OPENSSL_PUT_ERROR(RSA, RSA_R_DATA_TOO_SMALL);
114 OPENSSL_PUT_ERROR(RSA, RSA_R_BLOCK_TYPE_IS_NOT_01);
127 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_FIXED_HEADER_DECRYPT);
135 OPENSSL_PUT_ERROR(RSA, RSA_R_NULL_BEFORE_BLOCK_MISSING);
140 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_PAD_BYTE_COUNT);
146 OPENSSL_PUT_ERROR(RSA, RSA_R_DATA_TOO_LARGE);
160 OPENSSL_PUT_ERROR(RSA, RSA_R_KEY_SIZE_TOO_SMALL)
    [all...]
  /external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/rsa/
transform.py 35 from rsa import common
36 from rsa._compat import is_integer, b, byte, get_word_alignment, ZERO_BYTE, EMPTY_BYTE
pem.py 20 from rsa._compat import b, is_bytes
37 @param pem_marker: the marker of the PEM content, such as 'RSA PRIVATE KEY'
38 when your file has '-----BEGIN RSA PRIVATE KEY-----' and
39 '-----END RSA PRIVATE KEY-----' markers.
99 @param pem_marker: the marker of the PEM content, such as 'RSA PRIVATE KEY'
100 when your file has '-----BEGIN RSA PRIVATE KEY-----' and
101 '-----END RSA PRIVATE KEY-----' markers.
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/rsa/
KeyPairGeneratorSpi.java 1 package org.bouncycastle.jcajce.provider.asymmetric.rsa;
33 super("RSA");
BCRSAPrivateKey.java 1 package org.bouncycastle.jcajce.provider.asymmetric.rsa;
76 return "RSA";
  /external/conscrypt/src/gen/native/
generate_constants.cc 21 #include <openssl/rsa.h>
  /external/curl/lib/
ssh.h 115 char *rsa; /* path name */ member in struct:ssh_conn
ssh.c 814 sshc->rsa_pub = sshc->rsa = NULL;
821 sshc->rsa = strdup(data->set.str[STRING_SSH_PRIVATE_KEY]);
826 sshc->rsa = aprintf("%s/.ssh/id_rsa", home);
827 if(!sshc->rsa)
829 else if(access(sshc->rsa, R_OK) != 0) {
830 Curl_safefree(sshc->rsa);
831 sshc->rsa = aprintf("%s/.ssh/id_dsa", home);
832 if(!sshc->rsa)
834 else if(access(sshc->rsa, R_OK) != 0) {
835 Curl_safefree(sshc->rsa);
    [all...]
  /external/libchrome/crypto/
signature_creator_openssl.cc 8 #include <openssl/rsa.h>
  /external/wpa_supplicant_8/src/crypto/
Makefile 57 LIB_OBJS += crypto_internal-rsa.o
  /system/keymaster/
openssl_utils.h 24 #include <openssl/rsa.h>
64 DEFINE_OPENSSL_OBJECT_POINTER(RSA)
  /external/ipsec-tools/src/racoon/
prsa_par.y 36 /* This file contains a parser for FreeS/WAN-style ipsec.secrets RSA keys. */
62 #include <openssl/rsa.h>
88 static RSA *rsa_cur;
132 RSA *rsa;
149 %type <rsa> rsa_statement
  /external/libweave/examples/provider/
event_http_server.cc 119 auto rsa = RSA_new(); local
120 RSA_generate_key_ex(rsa, 2048, big_num.get(), nullptr);
121 CHECK(EVP_PKEY_assign_RSA(pkey, rsa)) << GetSslError();
  /external/curl/lib/vtls/
openssl.c 65 #include <openssl/rsa.h>
2464 RSA *rsa; local
    [all...]
  /external/boringssl/src/crypto/evp/
evp_asn1.c 10 * apply to all code found in this distribution, be it the RC4, RSA,
131 /* Since we only need to discern "traditional format" RSA and DSA
170 return i2d_RSAPublicKey(key->pkey.rsa, outp);
  /external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/doc/
Makefile 77 @echo "# qcollectiongenerator $(BUILDDIR)/qthelp/Python-RSA.qhcp"
79 @echo "# assistant -collectionFile $(BUILDDIR)/qthelp/Python-RSA.qhc"
86 @echo "# mkdir -p $$HOME/.local/share/devhelp/Python-RSA"
87 @echo "# ln -s $(BUILDDIR)/devhelp $$HOME/.local/share/devhelp/Python-RSA"
138 rsync _build/html/* sybren@stuvel.eu:stuvel.eu/manager/files/python-rsa-doc/ -va
  /external/tpm2/
CryptoEngine.h 47 UINT32 rsa; member in struct:__anon23169
175 // RSA-related Structures
177 // This structure is a succinct representation of the cryptographic components of an RSA key.
196 # else // RSA but no ECC
  /hardware/qcom/keymaster/
keymaster_qcom.cpp 26 #include <openssl/rsa.h>
86 void operator()(RSA* p) const {
90 typedef UniquePtr<RSA, RSA_Delete> Unique_RSA;
138 Unique_RSA rsa(RSA_new());
139 if (rsa.get() == NULL) {
140 ALOGE("Could not allocate RSA structure");
144 rsa->n = BN_bin2bn(reinterpret_cast<const unsigned char*>(keyblob_ptr->modulus),
146 if (rsa->n == NULL) {
151 rsa->e = BN_bin2bn(reinterpret_cast<const unsigned char*>(&keyblob_ptr->public_exponent),
153 if (rsa->e == NULL)
    [all...]
  /system/tpm/attestation/common/
crypto_utility_impl.h 24 #include <openssl/rsa.h>
90 // Encrypts using RSA-OAEP and the TPM-specific OAEP parameter.
92 RSA* key,

Completed in 3058 milliseconds

1 2 3 45 6 7 8 9