HomeSort by relevance Sort by last modified time
    Searched refs:rsa (Results 126 - 150 of 203) sorted by null

1 2 3 4 56 7 8 9

  /external/conscrypt/src/main/native/
org_conscrypt_NativeCrypto.cpp 52 #include <openssl/rsa.h>
107 * "RSA Session-ID:... Master-Key:..." <CR>
108 * "RSA Session-ID:... Master-Key:..." <CR>
258 void operator()(RSA* p) const {
262 typedef UniquePtr<RSA, RSA_Delete> Unique_RSA;
    [all...]
  /cts/hostsidetests/devicepolicy/app/DeviceOwner/assets/
generate-client-cert-chain.sh 60 -newkey rsa:1024 \
  /external/ipsec-tools/src/racoon/
handler.h 38 #include <openssl/rsa.h>
167 RSA *rsa; /* my RSA key */ member in struct:ph1handle
168 RSA *rsa_p; /* peer's RSA key */
169 struct genlist *rsa_candidates; /* possible candidates for peer's RSA key */
plainrsa-gen.c 34 /* This file contains a generator for FreeS/WAN-style ipsec.secrets RSA keys. */
51 #include <openssl/rsa.h>
67 fprintf(stderr, "Plain RSA key generator, part of %s\n", TOP_PACKAGE_STRING);
72 fprintf(stderr, " -b bits Generate <bits> long RSA key (default=1024)\n");
85 mix_b64_pubkey(RSA *key)
121 RSA *key;
137 fprintf(fp, ": RSA\t{\n");
138 fprintf(fp, "\t# RSA %zu bits\n", bits);
crypto_openssl.c 979 res = eay_rsa_verify(source, sig, evp->pkey.rsa);
988 * check RSA signature
993 eay_check_rsasign(source, sig, rsa)
996 RSA *rsa;
998 return eay_rsa_verify(source, sig, rsa);
1134 sig = eay_rsa_sign(src, evp->pkey.rsa);
1142 eay_get_rsasign(src, rsa)
1144 RSA *rsa;
    [all...]
  /external/wpa_supplicant_8/hs20/client/
est.c 14 #include <openssl/rsa.h>
377 RSA *rsa; local
388 wpa_printf(MSG_INFO, "Generate RSA private key");
389 write_summary(ctx, "Generate RSA private key");
405 rsa = EVP_PKEY_get1_RSA(pkey);
406 if (rsa == NULL)
413 if (!PEM_write_RSAPrivateKey(f, rsa, NULL, NULL, 0, NULL,
  /system/update_engine/payload_generator/
payload_signer.cc 362 RSA* rsa = PEM_read_RSAPrivateKey(fprikey, nullptr, nullptr, nullptr); local
364 TEST_AND_RETURN_FALSE(rsa != nullptr);
365 brillo::Blob signature(RSA_size(rsa));
369 rsa,
371 RSA_free(rsa);
  /external/boringssl/src/include/openssl/
x509.h 10 * apply to all code found in this distribution, be it the RC4, RSA,
79 #include <openssl/rsa.h>
646 OPENSSL_EXPORT RSA *d2i_RSAPrivateKey_fp(FILE *fp,RSA **rsa);
647 OPENSSL_EXPORT int i2d_RSAPrivateKey_fp(FILE *fp,RSA *rsa);
648 OPENSSL_EXPORT RSA *d2i_RSAPublicKey_fp(FILE *fp,RSA **rsa);
    [all...]
  /bootable/recovery/
verifier.cpp 110 // Look for an RSA signature embedded in the .ZIP file comment given
272 sig_der_length, key.rsa.get())) {
273 LOGI("failed to verify against RSA key %zu\n", i);
277 LOGI("whole-file signature verified against RSA key %zu\n", i);
308 std::unique_ptr<RSA, RSADeleter> parse_rsa_key(FILE* file, uint32_t exponent) {
361 std::unique_ptr<RSA, RSADeleter> key(RSA_new());
469 // 1: 2048-bit RSA key with e=3 and SHA-1 hash
470 // 2: 2048-bit RSA key with e=65537 and SHA-1 hash
471 // 3: 2048-bit RSA key with e=3 and SHA-256 hash
472 // 4: 2048-bit RSA key with e=65537 and SHA-256 has
    [all...]
  /external/boringssl/src/crypto/test/
scoped_types.h 35 #include <openssl/rsa.h>
113 using ScopedRSA = ScopedOpenSSLType<RSA, RSA_free>;
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/
RSA.java 10 import org.bouncycastle.jcajce.provider.asymmetric.rsa.KeyFactorySpi;
15 public class RSA
17 private static final String PREFIX = "org.bouncycastle.jcajce.provider.asymmetric" + ".rsa.";
50 provider.addAlgorithm("Cipher.RSA", PREFIX + "CipherSpi$NoPadding");
52 provider.addAlgorithm("Alg.Alias.Cipher.RSA/RAW", "RSA");
55 // provider.addAlgorithm("Cipher.RSA/PKCS1", PREFIX + "CipherSpi$PKCS1v1_5Padding");
58 // provider.addAlgorithm("Cipher.RSA/1", PREFIX + "CipherSpi$PKCS1v1_5Padding_PrivateOnly");
59 // provider.addAlgorithm("Cipher.RSA/2", PREFIX + "CipherSpi$PKCS1v1_5Padding_PublicOnly");
60 // provider.addAlgorithm("Cipher.RSA/OAEP", PREFIX + "CipherSpi$OAEPPadding")
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/rsa/
BCRSAPublicKey.java 1 package org.bouncycastle.jcajce.provider.asymmetric.rsa;
73 throw new IllegalArgumentException("invalid info structure in RSA public key");
99 return "RSA";
140 buf.append("RSA Public Key").append(nl);
KeyFactorySpi.java 1 package org.bouncycastle.jcajce.provider.asymmetric.rsa;
  /external/curl/lib/vtls/
polarssl.c 250 rsa_copy(&connssl->rsa, pk_rsa(pk));
252 rsa_free(&connssl->rsa);
362 &connssl->clicert, &connssl->rsa);
624 rsa_free(&conn->ssl[sockindex].rsa);
  /external/libchrome/crypto/
nss_key_util.cc 52 // See pk11_MakeIDFromPublicKey from NSS. For now, only RSA keys are
57 return ScopedSECItem(PK11_MakeIDFromPubKey(&result->u.rsa.modulus));
  /external/vboot_reference/host/lib/
util_misc.c 9 #include <openssl/rsa.h>
48 /* Size of RSA key in 32-bit words */
  /system/extras/libfec/
fec_private.h 33 #include <mincrypt/rsa.h>
  /system/extras/libfec/include/fec/
io.h 27 #include <mincrypt/rsa.h>
  /system/security/keystore-engine/
eng_keystore.cpp 38 #include <openssl/rsa.h>
93 * Called to initialize RSA's ex_data for the key_id handle. This should
192 ALOGE("RSA registration failed");
  /external/boringssl/src/crypto/pem/
pem_info.c 11 * apply to all code found in this distribution, be it the RC4, RSA,
71 #include <openssl/rsa.h>
262 { /* encrypted RSA data */
382 xi->x_pkey->dec_pkey->pkey.rsa,
  /external/wpa_supplicant_8/src/crypto/
tls_openssl.c 304 unsigned char *to, RSA *rsa, int padding)
312 unsigned char *to, RSA *rsa, int padding)
320 unsigned char *to, RSA *rsa, int padding)
323 (struct cryptoapi_rsa_data *) rsa->meth->app_data;
374 len = RSA_size(rsa);
399 unsigned char *to, RSA *rsa, int padding
476 RSA *rsa = NULL, *pub_rsa; local
    [all...]
  /device/google/contexthub/firmware/src/
appSec.c 22 #include <nanohub/rsa.h>
63 struct RsaState rsa; member in struct:AppSecState::__anon3078::__anon3080
376 result = BL.blRsaPubOpIterative(&state->rsa, state->rsaTmp, state->dataWords, &state->rsaState1, &state->rsaState2, &state->rsaStep);
380 //we just finished the RSA-ing
  /external/boringssl/
sources.mk 188 src/crypto/rsa/blinding.c\
189 src/crypto/rsa/padding.c\
190 src/crypto/rsa/rsa.c\
191 src/crypto/rsa/rsa_asn1.c\
192 src/crypto/rsa/rsa_impl.c\
  /external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/cloudfront/
distribution.py 653 Requires the rsa library be installed.
656 import rsa namespace
658 raise NotImplementedError("Boto depends on the python rsa "
676 private_key = rsa.PrivateKey.load_pkcs1(private_key_string)
677 signature = rsa.sign(str(message), private_key, 'SHA-1')
  /external/boringssl/src/ssl/
s3_lib.c 10 * apply to all code found in this distribution, be it the RC4, RSA,
269 int SSL_CTX_set_tmp_rsa(SSL_CTX *ctx, const RSA *rsa) {
273 int SSL_set_tmp_rsa(SSL *ssl, const RSA *rsa) {
570 /* ECDSA certs can be used with RSA cipher suites as well so we don't need to

Completed in 885 milliseconds

1 2 3 4 56 7 8 9