/system/tpm/trunks/ |
session_manager_impl.cc | 29 #include <openssl/rsa.h> 88 // padded RSA public key encryption. This is specified in TPM2.0 156 public_data.public_area.unique.rsa.size = 0; 168 LOG(ERROR) << "Error creating exponent for RSA: " << GetOpenSSLError(); 173 BN_bin2bn(public_data.public_area.unique.rsa.buffer, 174 public_data.public_area.unique.rsa.size, nullptr); 176 LOG(ERROR) << "Error setting public area of rsa key: " << GetOpenSSLError();
|
trunks_client_test.cc | 32 #include <openssl/rsa.h> 437 LOG(ERROR) << "Error creating RSA key: " << GetErrorString(result); 444 LOG(ERROR) << "Error loading RSA key: " << GetErrorString(result); 470 LOG(ERROR) << "Error signing using RSA key: " << GetErrorString(result); 476 LOG(ERROR) << "Error verifying using RSA key: " << GetErrorString(result); 485 LOG(ERROR) << "Error encrypting using RSA key: " << GetErrorString(result); 501 LOG(ERROR) << "Error encrypting using RSA key: " << GetErrorString(result); 566 LOG(ERROR) << "Error creating RSA key: " << GetErrorString(result); 572 LOG(ERROR) << "Error loading RSA key: " << GetErrorString(result); 746 LOG(ERROR) << "Error creating RSA key: " << GetErrorString(result) [all...] |
/external/vboot_reference/futility/ |
vb1_helper.c | 12 #include <openssl/rsa.h> 497 RSAPublicKey *rsa; local 557 rsa = PublicKeyToRSA(data_key); 558 if (!rsa) { 565 g_preamble->preamble_size, rsa)) { 615 &g_preamble->body_signature, rsa)) { 724 RSAPublicKey *rsa; local 727 rsa = PublicKeyToRSA(&key_block->data_key); 733 VerifyFirmwarePreamble(fw_preamble, len - more, rsa)) 739 VerifyKernelPreamble(kern_preamble, len - more, rsa)) [all...] |
cmd_show.c | 328 RSAPublicKey *rsa = PublicKeyToRSA(&key_block->data_key); local 329 if (!rsa) { 338 len - more, rsa)) { 388 VerifyData(fv_data, fv_size, &preamble->body_signature, rsa)) { 441 RSAPublicKey *rsa = PublicKeyToRSA(&key_block->data_key); local 442 if (!rsa) { 451 len - more, rsa)) { 509 &preamble->body_signature, rsa)) {
|
/external/webrtc/webrtc/base/ |
opensslidentity.cc | 22 #include <openssl/rsa.h> 52 RSA* rsa = RSA_new(); local 53 if (!pkey || !exponent || !rsa || 55 !RSA_generate_key_ex(rsa, key_length, exponent, NULL) || 56 !EVP_PKEY_assign_RSA(pkey, rsa)) { 59 RSA_free(rsa); 60 LOG(LS_ERROR) << "Failed to make RSA key pair"; 63 // ownership of rsa struct was assigned, don't free it.
|
sslidentity.h | 140 // Generate a a KeyParams for RSA with explicit parameters. 141 static KeyParams RSA(int mod_size = kRsaDefaultModSize, 161 RSAParams rsa; member in union:rtc::KeyParams::__anon26322
|
/external/boringssl/src/crypto/rsa/ |
padding.c | 56 #include <openssl/rsa.h> 79 OPENSSL_PUT_ERROR(RSA, RSA_R_KEY_SIZE_TOO_SMALL); 84 OPENSSL_PUT_ERROR(RSA, RSA_R_DATA_TOO_LARGE_FOR_KEY_SIZE); 108 OPENSSL_PUT_ERROR(RSA, RSA_R_DATA_TOO_SMALL); 114 OPENSSL_PUT_ERROR(RSA, RSA_R_BLOCK_TYPE_IS_NOT_01); 127 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_FIXED_HEADER_DECRYPT); 135 OPENSSL_PUT_ERROR(RSA, RSA_R_NULL_BEFORE_BLOCK_MISSING); 140 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_PAD_BYTE_COUNT); 146 OPENSSL_PUT_ERROR(RSA, RSA_R_DATA_TOO_LARGE); 160 OPENSSL_PUT_ERROR(RSA, RSA_R_KEY_SIZE_TOO_SMALL) [all...] |
/external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/rsa/ |
transform.py | 35 from rsa import common 36 from rsa._compat import is_integer, b, byte, get_word_alignment, ZERO_BYTE, EMPTY_BYTE
|
pem.py | 20 from rsa._compat import b, is_bytes 37 @param pem_marker: the marker of the PEM content, such as 'RSA PRIVATE KEY' 38 when your file has '-----BEGIN RSA PRIVATE KEY-----' and 39 '-----END RSA PRIVATE KEY-----' markers. 99 @param pem_marker: the marker of the PEM content, such as 'RSA PRIVATE KEY' 100 when your file has '-----BEGIN RSA PRIVATE KEY-----' and 101 '-----END RSA PRIVATE KEY-----' markers.
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/rsa/ |
KeyPairGeneratorSpi.java | 1 package org.bouncycastle.jcajce.provider.asymmetric.rsa; 33 super("RSA");
|
BCRSAPrivateKey.java | 1 package org.bouncycastle.jcajce.provider.asymmetric.rsa; 76 return "RSA";
|
/external/conscrypt/src/gen/native/ |
generate_constants.cc | 21 #include <openssl/rsa.h>
|
/external/curl/lib/ |
ssh.h | 115 char *rsa; /* path name */ member in struct:ssh_conn
|
ssh.c | 814 sshc->rsa_pub = sshc->rsa = NULL; 821 sshc->rsa = strdup(data->set.str[STRING_SSH_PRIVATE_KEY]); 826 sshc->rsa = aprintf("%s/.ssh/id_rsa", home); 827 if(!sshc->rsa) 829 else if(access(sshc->rsa, R_OK) != 0) { 830 Curl_safefree(sshc->rsa); 831 sshc->rsa = aprintf("%s/.ssh/id_dsa", home); 832 if(!sshc->rsa) 834 else if(access(sshc->rsa, R_OK) != 0) { 835 Curl_safefree(sshc->rsa); [all...] |
/external/libchrome/crypto/ |
signature_creator_openssl.cc | 8 #include <openssl/rsa.h>
|
/external/wpa_supplicant_8/src/crypto/ |
Makefile | 57 LIB_OBJS += crypto_internal-rsa.o
|
/system/keymaster/ |
openssl_utils.h | 24 #include <openssl/rsa.h> 64 DEFINE_OPENSSL_OBJECT_POINTER(RSA)
|
/external/ipsec-tools/src/racoon/ |
prsa_par.y | 36 /* This file contains a parser for FreeS/WAN-style ipsec.secrets RSA keys. */ 62 #include <openssl/rsa.h> 88 static RSA *rsa_cur; 132 RSA *rsa; 149 %type <rsa> rsa_statement
|
/external/libweave/examples/provider/ |
event_http_server.cc | 119 auto rsa = RSA_new(); local 120 RSA_generate_key_ex(rsa, 2048, big_num.get(), nullptr); 121 CHECK(EVP_PKEY_assign_RSA(pkey, rsa)) << GetSslError();
|
/external/curl/lib/vtls/ |
openssl.c | 65 #include <openssl/rsa.h> 2464 RSA *rsa; local [all...] |
/external/boringssl/src/crypto/evp/ |
evp_asn1.c | 10 * apply to all code found in this distribution, be it the RC4, RSA, 131 /* Since we only need to discern "traditional format" RSA and DSA 170 return i2d_RSAPublicKey(key->pkey.rsa, outp);
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/doc/ |
Makefile | 77 @echo "# qcollectiongenerator $(BUILDDIR)/qthelp/Python-RSA.qhcp" 79 @echo "# assistant -collectionFile $(BUILDDIR)/qthelp/Python-RSA.qhc" 86 @echo "# mkdir -p $$HOME/.local/share/devhelp/Python-RSA" 87 @echo "# ln -s $(BUILDDIR)/devhelp $$HOME/.local/share/devhelp/Python-RSA" 138 rsync _build/html/* sybren@stuvel.eu:stuvel.eu/manager/files/python-rsa-doc/ -va
|
/external/tpm2/ |
CryptoEngine.h | 47 UINT32 rsa; member in struct:__anon23169 175 // RSA-related Structures 177 // This structure is a succinct representation of the cryptographic components of an RSA key. 196 # else // RSA but no ECC
|
/hardware/qcom/keymaster/ |
keymaster_qcom.cpp | 26 #include <openssl/rsa.h> 86 void operator()(RSA* p) const { 90 typedef UniquePtr<RSA, RSA_Delete> Unique_RSA; 138 Unique_RSA rsa(RSA_new()); 139 if (rsa.get() == NULL) { 140 ALOGE("Could not allocate RSA structure"); 144 rsa->n = BN_bin2bn(reinterpret_cast<const unsigned char*>(keyblob_ptr->modulus), 146 if (rsa->n == NULL) { 151 rsa->e = BN_bin2bn(reinterpret_cast<const unsigned char*>(&keyblob_ptr->public_exponent), 153 if (rsa->e == NULL) [all...] |
/system/tpm/attestation/common/ |
crypto_utility_impl.h | 24 #include <openssl/rsa.h> 90 // Encrypts using RSA-OAEP and the TPM-specific OAEP parameter. 92 RSA* key,
|