/external/conscrypt/src/main/native/ |
org_conscrypt_NativeCrypto.cpp | 52 #include <openssl/rsa.h> 107 * "RSA Session-ID:... Master-Key:..." <CR> 108 * "RSA Session-ID:... Master-Key:..." <CR> 258 void operator()(RSA* p) const { 262 typedef UniquePtr<RSA, RSA_Delete> Unique_RSA; [all...] |
/cts/hostsidetests/devicepolicy/app/DeviceOwner/assets/ |
generate-client-cert-chain.sh | 60 -newkey rsa:1024 \
|
/external/ipsec-tools/src/racoon/ |
handler.h | 38 #include <openssl/rsa.h> 167 RSA *rsa; /* my RSA key */ member in struct:ph1handle 168 RSA *rsa_p; /* peer's RSA key */ 169 struct genlist *rsa_candidates; /* possible candidates for peer's RSA key */
|
plainrsa-gen.c | 34 /* This file contains a generator for FreeS/WAN-style ipsec.secrets RSA keys. */ 51 #include <openssl/rsa.h> 67 fprintf(stderr, "Plain RSA key generator, part of %s\n", TOP_PACKAGE_STRING); 72 fprintf(stderr, " -b bits Generate <bits> long RSA key (default=1024)\n"); 85 mix_b64_pubkey(RSA *key) 121 RSA *key; 137 fprintf(fp, ": RSA\t{\n"); 138 fprintf(fp, "\t# RSA %zu bits\n", bits);
|
crypto_openssl.c | 979 res = eay_rsa_verify(source, sig, evp->pkey.rsa); 988 * check RSA signature 993 eay_check_rsasign(source, sig, rsa) 996 RSA *rsa; 998 return eay_rsa_verify(source, sig, rsa); 1134 sig = eay_rsa_sign(src, evp->pkey.rsa); 1142 eay_get_rsasign(src, rsa) 1144 RSA *rsa; [all...] |
/external/wpa_supplicant_8/hs20/client/ |
est.c | 14 #include <openssl/rsa.h> 377 RSA *rsa; local 388 wpa_printf(MSG_INFO, "Generate RSA private key"); 389 write_summary(ctx, "Generate RSA private key"); 405 rsa = EVP_PKEY_get1_RSA(pkey); 406 if (rsa == NULL) 413 if (!PEM_write_RSAPrivateKey(f, rsa, NULL, NULL, 0, NULL,
|
/system/update_engine/payload_generator/ |
payload_signer.cc | 362 RSA* rsa = PEM_read_RSAPrivateKey(fprikey, nullptr, nullptr, nullptr); local 364 TEST_AND_RETURN_FALSE(rsa != nullptr); 365 brillo::Blob signature(RSA_size(rsa)); 369 rsa, 371 RSA_free(rsa);
|
/external/boringssl/src/include/openssl/ |
x509.h | 10 * apply to all code found in this distribution, be it the RC4, RSA, 79 #include <openssl/rsa.h> 646 OPENSSL_EXPORT RSA *d2i_RSAPrivateKey_fp(FILE *fp,RSA **rsa); 647 OPENSSL_EXPORT int i2d_RSAPrivateKey_fp(FILE *fp,RSA *rsa); 648 OPENSSL_EXPORT RSA *d2i_RSAPublicKey_fp(FILE *fp,RSA **rsa); [all...] |
/bootable/recovery/ |
verifier.cpp | 110 // Look for an RSA signature embedded in the .ZIP file comment given 272 sig_der_length, key.rsa.get())) { 273 LOGI("failed to verify against RSA key %zu\n", i); 277 LOGI("whole-file signature verified against RSA key %zu\n", i); 308 std::unique_ptr<RSA, RSADeleter> parse_rsa_key(FILE* file, uint32_t exponent) { 361 std::unique_ptr<RSA, RSADeleter> key(RSA_new()); 469 // 1: 2048-bit RSA key with e=3 and SHA-1 hash 470 // 2: 2048-bit RSA key with e=65537 and SHA-1 hash 471 // 3: 2048-bit RSA key with e=3 and SHA-256 hash 472 // 4: 2048-bit RSA key with e=65537 and SHA-256 has [all...] |
/external/boringssl/src/crypto/test/ |
scoped_types.h | 35 #include <openssl/rsa.h> 113 using ScopedRSA = ScopedOpenSSLType<RSA, RSA_free>;
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/ |
RSA.java | 10 import org.bouncycastle.jcajce.provider.asymmetric.rsa.KeyFactorySpi; 15 public class RSA 17 private static final String PREFIX = "org.bouncycastle.jcajce.provider.asymmetric" + ".rsa."; 50 provider.addAlgorithm("Cipher.RSA", PREFIX + "CipherSpi$NoPadding"); 52 provider.addAlgorithm("Alg.Alias.Cipher.RSA/RAW", "RSA"); 55 // provider.addAlgorithm("Cipher.RSA/PKCS1", PREFIX + "CipherSpi$PKCS1v1_5Padding"); 58 // provider.addAlgorithm("Cipher.RSA/1", PREFIX + "CipherSpi$PKCS1v1_5Padding_PrivateOnly"); 59 // provider.addAlgorithm("Cipher.RSA/2", PREFIX + "CipherSpi$PKCS1v1_5Padding_PublicOnly"); 60 // provider.addAlgorithm("Cipher.RSA/OAEP", PREFIX + "CipherSpi$OAEPPadding") [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/rsa/ |
BCRSAPublicKey.java | 1 package org.bouncycastle.jcajce.provider.asymmetric.rsa; 73 throw new IllegalArgumentException("invalid info structure in RSA public key"); 99 return "RSA"; 140 buf.append("RSA Public Key").append(nl);
|
KeyFactorySpi.java | 1 package org.bouncycastle.jcajce.provider.asymmetric.rsa;
|
/external/curl/lib/vtls/ |
polarssl.c | 250 rsa_copy(&connssl->rsa, pk_rsa(pk)); 252 rsa_free(&connssl->rsa); 362 &connssl->clicert, &connssl->rsa); 624 rsa_free(&conn->ssl[sockindex].rsa);
|
/external/libchrome/crypto/ |
nss_key_util.cc | 52 // See pk11_MakeIDFromPublicKey from NSS. For now, only RSA keys are 57 return ScopedSECItem(PK11_MakeIDFromPubKey(&result->u.rsa.modulus));
|
/external/vboot_reference/host/lib/ |
util_misc.c | 9 #include <openssl/rsa.h> 48 /* Size of RSA key in 32-bit words */
|
/system/extras/libfec/ |
fec_private.h | 33 #include <mincrypt/rsa.h>
|
/system/extras/libfec/include/fec/ |
io.h | 27 #include <mincrypt/rsa.h>
|
/system/security/keystore-engine/ |
eng_keystore.cpp | 38 #include <openssl/rsa.h> 93 * Called to initialize RSA's ex_data for the key_id handle. This should 192 ALOGE("RSA registration failed");
|
/external/boringssl/src/crypto/pem/ |
pem_info.c | 11 * apply to all code found in this distribution, be it the RC4, RSA, 71 #include <openssl/rsa.h> 262 { /* encrypted RSA data */ 382 xi->x_pkey->dec_pkey->pkey.rsa,
|
/external/wpa_supplicant_8/src/crypto/ |
tls_openssl.c | 304 unsigned char *to, RSA *rsa, int padding) 312 unsigned char *to, RSA *rsa, int padding) 320 unsigned char *to, RSA *rsa, int padding) 323 (struct cryptoapi_rsa_data *) rsa->meth->app_data; 374 len = RSA_size(rsa); 399 unsigned char *to, RSA *rsa, int padding 476 RSA *rsa = NULL, *pub_rsa; local [all...] |
/device/google/contexthub/firmware/src/ |
appSec.c | 22 #include <nanohub/rsa.h> 63 struct RsaState rsa; member in struct:AppSecState::__anon3078::__anon3080 376 result = BL.blRsaPubOpIterative(&state->rsa, state->rsaTmp, state->dataWords, &state->rsaState1, &state->rsaState2, &state->rsaStep); 380 //we just finished the RSA-ing
|
/external/boringssl/ |
sources.mk | 188 src/crypto/rsa/blinding.c\ 189 src/crypto/rsa/padding.c\ 190 src/crypto/rsa/rsa.c\ 191 src/crypto/rsa/rsa_asn1.c\ 192 src/crypto/rsa/rsa_impl.c\
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/cloudfront/ |
distribution.py | 653 Requires the rsa library be installed. 656 import rsa namespace 658 raise NotImplementedError("Boto depends on the python rsa " 676 private_key = rsa.PrivateKey.load_pkcs1(private_key_string) 677 signature = rsa.sign(str(message), private_key, 'SHA-1')
|
/external/boringssl/src/ssl/ |
s3_lib.c | 10 * apply to all code found in this distribution, be it the RC4, RSA, 269 int SSL_CTX_set_tmp_rsa(SSL_CTX *ctx, const RSA *rsa) { 273 int SSL_set_tmp_rsa(SSL *ssl, const RSA *rsa) { 570 /* ECDSA certs can be used with RSA cipher suites as well so we don't need to
|