/external/vboot_reference/firmware/lib/ |
vboot_common.c | 125 RSAPublicKey *rsa; local 138 rsa = RSAPublicKeyFromBuf(GetPublicKeyDataC(key), key->key_size); 139 if (!rsa) 142 rsa->algorithm = (unsigned int)key->algorithm; 143 return rsa; 255 RSAPublicKey *rsa; local 265 rsa = PublicKeyToRSA(key); 266 if (!rsa) { 274 RSAPublicKeyFree(rsa); 279 rv = VerifyData((const uint8_t *)block, size, sig, rsa); [all...] |
/external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/rsa/ |
prime.py | 25 import rsa.randnum namespace 95 x = rsa.randnum.randint(n-1) 122 >>> from rsa import common 129 integer = rsa.randnum.read_random_int(nbits)
|
key.py | 17 '''RSA key generation code. 29 from rsa._compat import b, bytes_type 31 import rsa.prime namespace 32 import rsa.pem namespace 33 import rsa.common namespace 89 '''Represents a public RSA key. 158 from rsa.asn1 import AsnPubKey 170 from rsa.asn1 import AsnPubKey 183 The contents of the file before the "-----BEGIN RSA PUBLIC KEY-----" and 184 after the "-----END RSA PUBLIC KEY-----" lines is ignored [all...] |
varblock.py | 36 from rsa._compat import byte, b
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/tests/ |
test_transform.py | 5 from rsa._compat import b 6 from rsa.transform import int2bytes, bytes2int, _int2bytes
|
test_common.py | 6 from rsa._compat import byte, b 7 from rsa.common import byte_size, bit_size, _bit_size
|
/external/curl/tests/certs/scripts/ |
genserv.sh | 70 echo "openssl req -config $PREFIX-sv.prm -newkey rsa:$KEYSIZE -keyout $PREFIX-sv.key -out $PREFIX-sv.csr -passout XXX" 71 $OPENSSL req -config $PREFIX-sv.prm -newkey rsa:$KEYSIZE -keyout $PREFIX-sv.key -out $PREFIX-sv.csr -passout pass:secret 74 echo "openssl rsa -in $PREFIX-sv.key -out $PREFIX-sv.key" 75 $OPENSSL rsa -in $PREFIX-sv.key -out $PREFIX-sv.key -passin pass:secret 78 echo "openssl rsa -in $PREFIX-sv.key -pubout -outform DER -out $PREFIX-sv.pub.der" 79 $OPENSSL rsa -in $PREFIX-sv.key -pubout -outform DER -out $PREFIX-sv.pub.der 81 echo "openssl rsa -in $PREFIX-sv.key -pubout -outform PEM -out $PREFIX-sv.pub.pem" 82 $OPENSSL rsa -in $PREFIX-sv.key -pubout -outform PEM -out $PREFIX-sv.pub.pem
|
/system/extras/verity/ |
verify_boot_signature.c | 35 #include <openssl/rsa.h> 308 * Verifies the RSA signature 317 RSA *rsa = NULL; local 333 if ((rsa = EVP_PKEY_get1_RSA(pkey)) == NULL) { 339 bs->signature->data, bs->signature->length, rsa)) { 351 if (rsa) { 352 RSA_free(rsa);
|
/system/update_engine/payload_consumer/ |
payload_verifier.cc | 34 // form a sequence of 256 bytes (2048 bits) that is amenable to RSA signing. The 148 RSA* rsa = PEM_read_RSA_PUBKEY(fpubkey, nullptr, nullptr, dummy_password); local 150 TEST_AND_RETURN_FALSE(rsa != nullptr); 151 unsigned int keysize = RSA_size(rsa); 154 RSA_free(rsa); 163 rsa, 165 RSA_free(rsa);
|
/external/wpa_supplicant_8/src/crypto/ |
crypto_libtomcrypt.c | 408 rsa_key rsa; member in struct:crypto_public_key 412 rsa_key rsa; member in struct:crypto_private_key 425 res = rsa_import(key, len, &pk->rsa); 434 if (pk->rsa.type != PK_PUBLIC) { 437 rsa_free(&pk->rsa); 457 res = rsa_import(key, len, &pk->rsa); 466 if (pk->rsa.type != PK_PRIVATE) { 469 rsa_free(&pk->rsa); 579 return crypto_rsa_encrypt_pkcs1(2, &key->rsa, PK_PUBLIC, in, inlen, 588 return crypto_rsa_encrypt_pkcs1(1, &key->rsa, PK_PRIVATE, in, inlen [all...] |
/system/security/softkeymaster/ |
keymaster_openssl.cpp | 28 #include <openssl/rsa.h> 71 void operator()(RSA* p) const { RSA_free(p); } 73 typedef UniquePtr<RSA, RSA_Delete> Unique_RSA; 343 /* initialize RSA */ 344 Unique_RSA rsa(RSA_new()); 345 if (rsa.get() == NULL) { 350 if (!RSA_generate_key_ex(rsa.get(), rsa_params->modulus_size, bn.get(), NULL) || 351 RSA_check_key(rsa.get()) < 0) { 356 if (EVP_PKEY_assign_RSA(pkey, rsa.get()) == 0) { 360 release_because_ownership_transferred(rsa); [all...] |
/external/wpa_supplicant_8/hs20/server/ca/ |
setup.sh | 105 $OPENSSL req -config openssl.cnf.tmp -batch -new -newkey rsa:4096 -keyout rootCA/private/cakey.pem -out rootCA/careq.pem || fail "Failed to generate Root CA private key" 126 $OPENSSL req -config openssl.cnf.tmp -batch -new -newkey rsa:2048 -keyout demoCA/private/cakey.pem -out demoCA/careq.pem || fail "Failed to generate Intermediate CA private key" 130 openssl rsa -in demoCA/private/cakey.pem -out demoCA/private/cakey-plain.pem -passin pass:$PASS 143 $OPENSSL req -config $PWD/openssl.cnf.tmp -batch -new -newkey rsa:2048 -nodes -out ocsp.csr -keyout ocsp.key -extensions v3_OCSP 151 $OPENSSL req -config $PWD/openssl.cnf.tmp -batch -new -newkey rsa:2048 -nodes -out server-revoked.csr -keyout server-revoked.key 161 $OPENSSL req -config $PWD/openssl.cnf.tmp -batch -new -newkey rsa:2048 -nodes -out server-client.csr -keyout server-client.key || fail "Could not create server-client.key" 169 $OPENSSL req -config $PWD/openssl.cnf.tmp -batch -new -newkey rsa:2048 -nodes -out user.csr -keyout user.key || fail "Could not create user.key" 186 echo $OPENSSL req -config $PWD/openssl.cnf.tmp -batch -sha256 -new -newkey rsa:2048 -nodes -out server.csr -keyout server.key -reqexts v3_osu_server 187 $OPENSSL req -config $PWD/openssl.cnf.tmp -batch -sha256 -new -newkey rsa:2048 -nodes -out server.csr -keyout server.key -reqexts v3_osu_server || fail "Failed to generate server request"
|
/external/vboot_reference/futility/ |
cmd_vbutil_firmware.c | 181 RSAPublicKey *rsa; local 239 rsa = PublicKeyToRSA(&key_block->data_key); 240 if (!rsa) { 247 if (0 != VerifyFirmwarePreamble(preamble, blob_size - now, rsa)) { 285 rsa)) {
|
/system/keymaster/ |
rsa_operation.cpp | 79 UniquePtr<EVP_PKEY, EVP_PKEY_Delete> rsa(GetRsaKey(key, error)); 80 if (!rsa.get()) 83 RsaOperation* op = InstantiateOperation(digest, padding, rsa.release()); 166 LOG_E("Input too long: cannot operate on %u bytes of data with %u-byte RSA key", 250 LOG_E("Input too long: %d-byte digest cannot be used with %d-byte RSA key in PSS " 323 UniquePtr<RSA, RSA_Delete> rsa(EVP_PKEY_get1_RSA(const_cast<EVP_PKEY*>(rsa_key_))); 324 if (!rsa.get()) 327 if (!output->Reinitialize(RSA_size(rsa.get()))) 344 bytes_encrypted = RSA_private_encrypt(key_len, to_encrypt, output->peek_write(), rsa.get() [all...] |
rsa_keymaster1_key.h | 20 #include <openssl/rsa.h> 74 RsaKeymaster1Key(RSA* rsa_key, const AuthorizationSet& hw_enforced,
|
/system/tpm/attestation/common/ |
tpm_utility_v1.cc | 26 #include <openssl/rsa.h> 185 LOG(ERROR) << "Only RSA supported on TPM v1.2."; 197 // Create a non-migratable RSA key. 694 crypto::ScopedRSA rsa(RSA_new()); 695 CHECK(rsa.get()); 698 rsa.get()->e = BN_new(); 699 CHECK(rsa.get()->e); 700 BN_set_word(rsa.get()->e, kWellKnownExponent); 702 rsa.get()->e = BN_bin2bn(parms->exponent, parms->exponentSize, nullptr); 703 CHECK(rsa.get()->e) [all...] |
/external/boringssl/src/crypto/evp/ |
evp.c | 10 * apply to all code found in this distribution, be it the RC4, RSA, 68 #include <openssl/rsa.h> 221 int EVP_PKEY_set1_RSA(EVP_PKEY *pkey, RSA *key) { 229 int EVP_PKEY_assign_RSA(EVP_PKEY *pkey, RSA *key) { 233 RSA *EVP_PKEY_get0_RSA(EVP_PKEY *pkey) { 238 return pkey->pkey.rsa; 241 RSA *EVP_PKEY_get1_RSA(EVP_PKEY *pkey) { 242 RSA *rsa = EVP_PKEY_get0_RSA(pkey); local 243 if (rsa != NULL) [all...] |
/cts/apps/CtsVerifier/ |
create_test_certs.sh | 48 -newkey rsa:2048 \
|
/external/google-tv-pairing-protocol/cpp/src/polo/util/ |
certificateutil.cc | 81 RSA* rsa = RSA_generate_key(1025, RSA_F4, NULL, NULL); local 82 EVP_PKEY_assign_RSA(pkey, rsa);
|
/external/ipsec-tools/src/racoon/ |
prsa_tok.l | 36 /* This file contains a tokeniser for FreeS/WAN-style ipsec.secrets RSA keys. */ 40 #include <openssl/rsa.h> 60 RSA { return TAG_RSA; }
|
/external/boringssl/src/crypto/engine/ |
engine.c | 23 #include <openssl/rsa.h>
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/rsa/ |
RSAUtil.java | 1 package org.bouncycastle.jcajce.provider.asymmetric.rsa; 14 * utility class for converting java.security RSA objects into their
|
/external/libchrome/crypto/ |
scoped_openssl_types.h | 17 #include <openssl/rsa.h> 55 using ScopedRSA = ScopedOpenSSL<RSA, RSA_free>;
|
/external/vboot_reference/host/lib21/include/ |
host_key2.h | 218 * Return the signature algorithm implied by the bit length of an RSA key 220 * @param rsa RSA key 223 enum vb2_signature_algorithm vb2_rsa_sig_alg(struct rsa_st *rsa);
|
/libcore/ojluni/src/main/java/sun/security/rsa/ |
SunRsaSignEntries.java | 26 package sun.security.rsa; 45 map.put("KeyFactory.RSA", 46 "sun.security.rsa.RSAKeyFactory"); 47 map.put("KeyPairGenerator.RSA", 48 "sun.security.rsa.RSAKeyPairGenerator"); 50 "sun.security.rsa.RSASignature$MD2withRSA"); 52 "sun.security.rsa.RSASignature$MD5withRSA"); 54 "sun.security.rsa.RSASignature$SHA1withRSA"); 56 "sun.security.rsa.RSASignature$SHA256withRSA"); 58 "sun.security.rsa.RSASignature$SHA384withRSA") [all...] |