/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/rsa/ |
CipherSpi.java | 1 package org.bouncycastle.jcajce.provider.asymmetric.rsa; 107 throw new IllegalStateException("RSA Cipher not initialised"); 127 throw new IllegalArgumentException("not an RSA key!"); 139 throw new IllegalStateException("RSA Cipher not initialised"); 241 throw new NoSuchPaddingException(padding + " unavailable with RSA."); 278 throw new InvalidKeyException("unknown key type passed to RSA"); 345 throw new InvalidParameterException("unknown opmode " + opmode + " passed to RSA"); 402 throw new ArrayIndexOutOfBoundsException("too much data for RSA block"); 409 throw new ArrayIndexOutOfBoundsException("too much data for RSA block"); 429 throw new ArrayIndexOutOfBoundsException("too much data for RSA block") [all...] |
/external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/rsa/ |
_version200.py | 0 """RSA module 3 Module for calculating large primes, and RSA encryption, decryption, 21 from rsa._compat import byte 25 warnings.warn('Insecure version of the RSA module is imported as %s' % __name__) 371 """Generate RSA keys of nbits bits. Returns (p, q, e, d).
|
/external/vboot_reference/scripts/image_signing/ |
sign_official_build.sh | 470 key_size=$(openssl rsa -text -noout -in "${key_file}" | \
|
/external/vboot_reference/futility/ |
cmd_sign.c | 155 RSAPublicKey *rsa = PublicKeyToRSA(&key_block->data_key); local 156 if (!rsa) {
|
/system/tpm/trunks/ |
tpm_utility_impl.cc | 435 LOG(ERROR) << "Key handle given is not an RSA key"; 464 LOG(ERROR) << "Error performing RSA encrypt: " 504 LOG(ERROR) << "Key handle given is not an RSA key"; 533 LOG(ERROR) << "Error performing RSA decrypt: " 574 LOG(ERROR) << "Key handle given is not an RSA key"; 632 LOG(ERROR) << "Key handle given is not an RSA key"; 738 LOG(ERROR) << "Error getting Key name for RSA-SRK: " 788 LOG(ERROR) << "Error getting Key name for RSA-SRK: " 807 public_area.unique.rsa = Make_TPM2B_PUBLIC_KEY_RSA(modulus); 822 in_sensitive.sensitive.rsa = Make_TPM2B_PRIVATE_KEY_RSA(prime_factor) [all...] |
tpm_generated.h | 1460 BYTE rsa[MAX_RSA_KEY_BYTES]; member in union:trunks::TPMU_ENCRYPTED_SECRET 1509 TPM2B_PUBLIC_KEY_RSA rsa; member in union:trunks::TPMU_PUBLIC_ID 1533 TPM2B_PRIVATE_KEY_RSA rsa; member in union:trunks::TPMU_SENSITIVE_COMPOSITE [all...] |
/external/boringssl/src/crypto/evp/ |
evp_extra_test.cc | 27 #include <openssl/rsa.h> 33 // kExampleRSAKeyDER is an RSA private key in ASN.1, DER format. Of course, you 181 // kExampleRSAKeyDER using RSA-PSS with default hash functions. 237 // kBadPSSCert is an example RSA-PSS certificate with bad parameters. 442 ScopedRSA rsa(RSA_private_key_from_bytes(kExampleRSAKeyDER, 444 if (!rsa) { 448 if (!pkey || !EVP_PKEY_set1_RSA(pkey.get(), rsa.get())) { [all...] |
/external/boringssl/src/include/openssl/ |
ssl.h | 10 * apply to all code found in this distribution, be it the RC4, RSA, [all...] |
/external/boringssl/src/tool/ |
speed.cc | 29 #include <openssl/rsa.h> 133 static bool SpeedRSA(const std::string &key_name, RSA *key, 480 RSA *key = RSA_private_key_from_bytes(kDERRSAPrivate2048, 483 fprintf(stderr, "Failed to parse RSA key.\n"); 488 if (!SpeedRSA("RSA 2048", key, selected)) { 496 fprintf(stderr, "Failed to parse RSA key.\n"); 501 if (!SpeedRSA("RSA 2048 (3 prime, e=3)", key, selected)) { 509 fprintf(stderr, "Failed to parse 4096-bit RSA key.\n"); 514 if (!SpeedRSA("RSA 4096", key, selected)) {
|
/external/wpa_supplicant_8/hostapd/ |
Android.mk | 607 OBJS += src/crypto/crypto_internal-rsa.c 616 OBJS += src/tls/rsa.c
|
/hardware/libhardware/tests/keymaster/ |
keymaster_test.cpp | 184 void operator()(RSA* p) const { 188 typedef UniquePtr<RSA, RSA_Delete> Unique_RSA; 199 * DER-encoded PKCS#8 format RSA key. Generated using: 407 << "Should generate an RSA key with " << GetParam() << " bit modulus size"; 415 << "Should be able to retrieve RSA public key successfully"; 425 << "Generated key type should be of type RSA"; 427 Unique_RSA rsa(EVP_PKEY_get1_RSA(actual.get())); 428 ASSERT_FALSE(rsa.get() == NULL) 429 << "Should be able to extract RSA key from EVP_PKEY"; 431 ASSERT_EQ(static_cast<unsigned long>(RSA_F4), BN_get_word(rsa.get()->e) [all...] |
/system/keymaster/ |
soft_keymaster_context.cpp | [all...] |
android_keymaster_test.cpp | 254 TEST_P(NewKeyGeneration, Rsa) { [all...] |
/system/tpm/attestation/server/ |
pkcs11_key_store.cc | 33 #include <openssl/rsa.h> 248 LOG(ERROR) << "Pkcs11KeyStore: Only RSA supported.";
|
/external/ipsec-tools/src/racoon/ |
oakley.c | 966 * base:psk,rsa [all...] |
eaytest.c | 106 error = eay_check_rsasign(src, sig, evp->pkey.rsa); 122 "-----BEGIN RSA PRIVATE KEY-----\n" 136 "-----END RSA PRIVATE KEY-----\n\n"; 169 printf("RSA signed data.\n"); 1014 { "rsa", rsatest, },
|
/prebuilts/sdk/tools/lib/ |
signapk.jar | |
/external/vboot_reference/ |
Makefile | 290 firmware/lib/cryptolib/rsa.c \ 322 firmware/2lib/2rsa.c \ [all...] |
/libcore/ojluni/src/main/java/java/net/ |
URI.java | [all...] |
/external/curl/lib/ |
urldata.h | 306 rsa_context rsa; member in struct:ssl_connect_data [all...] |
/external/tlsdate/src/ |
tlsdate-helper.c | 842 public_key = &certificate->rsa; [all...] |
/system/update_engine/ |
Android.mk | 798 openssl rsa -in $$< -pubout -out $$@) [all...] |
/device/google/contexthub/firmware/src/ |
nanohubCommand.c | 30 #include <nanohub/rsa.h> [all...] |
/external/tpm2/ |
tpm_generated.c | [all...] |
/frameworks/base/ |
compiled-classes-phone | [all...] |