HomeSort by relevance Sort by last modified time
    Searched refs:rsa (Results 51 - 75 of 203) sorted by null

1 23 4 5 6 7 8 9

  /device/google/contexthub/util/nanoapp_sign/
Android.mk 22 ../../lib/nanohub/rsa.c \
Makefile 18 SRC = nanoapp_sign.c ../../lib/nanohub/rsa.c ../../lib/nanohub/sha2.c ../../lib/nanohub/nanoapp.c
  /external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/tests/
test_compat.py 6 from rsa._compat import is_bytes, byte
  /external/vboot_reference/tests/
gen_test_cases.sh 7 # Generate test cases for use for the RSA verify benchmark.
16 # of message digest algorithms and RSA key sizes.
29 > ${TEST_FILE}.rsa${keylen}_${hashalgo}.sig
run_rsa_tests.sh 7 # Run tests for RSA Signature verification.
23 echo -e "For ${COL_YELLOW}RSA-$keylen and $hashalgo${COL_STOP}:"
26 ${TEST_FILE}.rsa${keylen}_${hashalgo}.sig \
vb20_common3_tests.c 11 #include "2rsa.h"
178 struct vb2_public_key rsa; local
189 TEST_SUCC(vb2_unpack_key(&rsa, (uint8_t *)public_key,
204 TEST_SUCC(vb2_verify_fw_preamble(h, hsize, &rsa, &wb),
208 TEST_EQ(vb2_verify_fw_preamble(h, 4, &rsa, &wb),
213 TEST_EQ(vb2_verify_fw_preamble(h, hsize - 1, &rsa, &wb),
219 TEST_SUCC(vb2_verify_fw_preamble(h, hsize + 1, &rsa, &wb),
226 TEST_EQ(vb2_verify_fw_preamble(h, hsize, &rsa, &wb),
233 TEST_EQ(vb2_verify_fw_preamble(h, hsize, &rsa, &wb),
240 TEST_SUCC(vb2_verify_fw_preamble(h, hsize, &rsa, &wb)
    [all...]
vb2_rsa_tests.sh 7 # Run tests for RSA Signature verification.
23 echo -e "For ${COL_YELLOW}RSA-$keylen and $hashalgo${COL_STOP}:"
26 ${TEST_FILE}.rsa${keylen}_${hashalgo}.sig \
  /external/webrtc/webrtc/base/
sslidentity.cc 35 const char kPemTypeRsaPrivateKey[] = "RSA PRIVATE KEY";
44 params_.rsa.mod_size = kRsaDefaultModSize;
45 params_.rsa.pub_exp = kRsaDefaultExponent;
52 KeyParams KeyParams::RSA(int mod_size, int pub_exp) {
54 kt.params_.rsa.mod_size = mod_size;
55 kt.params_.rsa.pub_exp = pub_exp;
68 return (params_.rsa.mod_size >= kRsaMinModSize &&
69 params_.rsa.mod_size <= kRsaMaxModSize &&
70 params_.rsa.pub_exp > params_.rsa.mod_size)
    [all...]
  /external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/rsa/
bigfile.py 42 from rsa import key, common, pkcs1, varblock
43 from rsa._compat import byte
50 :param pub_key: :py:class:`rsa.PublicKey` to encrypt with
75 :param priv_key: :py:class:`rsa.PrivateKey` to decrypt with
cli.py 28 import rsa namespace
29 import rsa.bigfile namespace
30 import rsa.pkcs1 namespace
32 HASH_METHODS = sorted(rsa.pkcs1.HASH_METHODS.keys())
39 description='Generates a new RSA keypair of "keysize" bits.')
68 (pub_key, priv_key) = rsa.newkeys(keysize)
108 key_class = rsa.PublicKey
210 return rsa.encrypt(indata, pub_key)
222 key_class = rsa.PrivateKey
227 return rsa.decrypt(indata, priv_key
    [all...]
core.py 19 This is the actual core RSA implementation, which is only defined
24 from rsa._compat import is_integer
  /system/tpm/trunks/
session_manager_test.cc 68 TPM2B_PUBLIC_KEY_RSA rsa; local
69 rsa.size = bytes.size();
70 memcpy(rsa.buffer, bytes.data(), bytes.size());
71 return rsa;
108 public_data.public_area.unique.rsa = GetValidRSAPublicKey();
127 public_data.public_area.unique.rsa.size = 32;
138 public_data.public_area.unique.rsa = GetValidRSAPublicKey();
154 public_data.public_area.unique.rsa = GetValidRSAPublicKey();
  /external/chromium-trace/catapult/third_party/gsutil/third_party/oauth2client/oauth2client/
service_account.py 17 This credentials class is implemented on top of rsa library.
27 import rsa namespace
82 rsa_bytes = rsa.pkcs1.sign(assertion_input, self._private_key, 'SHA-256')
94 rsa.pkcs1.sign(blob, self._private_key, 'SHA-256'))
131 """Get an RSA private key object from a pkcs8 representation."""
135 der = rsa.pem.load_pem(private_key_pkcs8_text, 'PRIVATE KEY')
137 return rsa.PrivateKey.load_pkcs1(
  /libcore/support/src/test/java/tests/resources/x509/
create.sh 25 openssl req -config "$DIR/default.cnf" -new -key "$DIR/privkey.pem" -nodes -batch > /tmp/cert-rsa-req.pem
26 openssl req -in /tmp/cert-rsa-req.pem -pubkey -noout | openssl rsa -pubin -pubout -outform der > "$DIR/cert-rsa-pubkey.der"
27 openssl x509 -extfile "$DIR/default.cnf" -days 3650 -extensions usr_cert -req -signkey "$DIR/privkey.pem" -outform d -set_serial -99999999999999999999 < /tmp/cert-rsa-req.pem > "$DIR/cert-rsa.der"
28 rm /tmp/cert-rsa-req.pem
30 openssl asn1parse -in "$DIR/cert-rsa.der" -inform d -out "$DIR/cert-rsa-tbs.der" -noout -strparse 4
31 SIG_OFFSET=$(openssl asn1parse -in "$DIR/cert-rsa.der" -inform d | tail -1 | cut -f1 -d:
    [all...]
  /external/boringssl/src/crypto/rsa/
rsa_test.cc 10 * apply to all code found in this distribution, be it the RC4, RSA,
57 #include <openssl/rsa.h>
97 // RSA OAEP.
123 // RSA OAEP.
167 // RSA OAEP.
    [all...]
  /external/boringssl/src/ssl/
ssl_file.c 10 * apply to all code found in this distribution, be it the RC4, RSA,
343 RSA *rsa = NULL; local
358 rsa = d2i_RSAPrivateKey_bio(in, NULL);
361 rsa =
369 if (rsa == NULL) {
373 ret = SSL_use_RSAPrivateKey(ssl, rsa);
374 RSA_free(rsa);
466 RSA *rsa = NULL local
    [all...]
  /system/keymaster/
rsa_keymaster0_key.cpp 45 LOG_E("%s", "No public exponent specified for RSA key generation");
51 LOG_E("%s", "No key size specified for RSA key generation");
112 unique_ptr<RSA, RSA_Delete> rsa(engine_->BlobToRsaKey(key_material));
113 if (!rsa)
118 RsaKeymaster0Key(rsa.release(), hw_enforced, sw_enforced, &error));
rsa_keymaster1_key.cpp 113 unique_ptr<RSA, RSA_Delete> rsa(engine_->BuildRsaKey(key_material, additional_params, &error));
114 if (!rsa)
118 RsaKeymaster1Key(rsa.release(), hw_enforced, sw_enforced, &error));
rsa_keymaster0_key.h 20 #include <openssl/rsa.h>
63 RsaKeymaster0Key(RSA* rsa_key, const AuthorizationSet& hw_enforced,
rsa_keymaster1_operation.cpp 39 // to the hardware module. The regular Rsa*Operation classes will do software digesting and
95 Keymaster1Engine::KeyData* key_data = engine_->GetData(rsa_key); // key_data is owned by rsa
127 unique_ptr<EVP_PKEY, EVP_PKEY_Delete> rsa(GetEvpKey(rsa_km1_key, error));
128 if (!rsa)
133 return new RsaKeymaster1Operation<RsaSignOperation>(digest, padding, rsa.release(),
136 return new RsaKeymaster1Operation<RsaDecryptOperation>(digest, padding, rsa.release(),
139 LOG_E("Bug: Pubkey operation requested. Those should be handled by normal RSA operations.",
  /external/ipsec-tools/src/racoon/
prsa_par.h 96 RSA *rsa; member in union:YYSTYPE
  /external/libchrome/crypto/
rsa_private_key_openssl.cc 11 #include <openssl/rsa.h>
122 ScopedRSA rsa(EVP_PKEY_get1_RSA(key_));
123 if (!rsa)
126 if (!EVP_PKEY_set1_RSA(copy->key_, rsa.get()))
  /external/wpa_supplicant_8/src/tls/
Makefile 23 rsa.o \
  /system/keymaster/include/keymaster/
rsa_key_factory.h 21 #include <openssl/rsa.h>
  /system/tpm/attestation/common/
crypto_utility_impl.cc 33 #include <openssl/rsa.h>
169 crypto::ScopedRSA rsa(d2i_RSAPublicKey(nullptr, &asn1_ptr,
171 if (!rsa.get()) {
177 int length = i2d_RSA_PUBKEY(rsa.get(), &buffer);
192 crypto::ScopedRSA rsa(d2i_RSA_PUBKEY(NULL, &asn1_ptr,
194 if (!rsa.get()) {
200 int length = i2d_RSAPublicKey(rsa.get(), &buffer);
243 crypto::ScopedRSA rsa(d2i_RSA_PUBKEY(NULL, &asn1_ptr,
245 if (!rsa.get()) {
251 if (!TpmCompatibleOAEPEncrypt(asym_content, rsa.get()
    [all...]

Completed in 457 milliseconds

1 23 4 5 6 7 8 9