HomeSort by relevance Sort by last modified time
    Searched refs:rsa (Results 76 - 100 of 203) sorted by null

1 2 34 5 6 7 8 9

  /external/vboot_reference/firmware/lib/
vboot_common.c 125 RSAPublicKey *rsa; local
138 rsa = RSAPublicKeyFromBuf(GetPublicKeyDataC(key), key->key_size);
139 if (!rsa)
142 rsa->algorithm = (unsigned int)key->algorithm;
143 return rsa;
255 RSAPublicKey *rsa; local
265 rsa = PublicKeyToRSA(key);
266 if (!rsa) {
274 RSAPublicKeyFree(rsa);
279 rv = VerifyData((const uint8_t *)block, size, sig, rsa);
    [all...]
  /external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/rsa/
prime.py 25 import rsa.randnum namespace
95 x = rsa.randnum.randint(n-1)
122 >>> from rsa import common
129 integer = rsa.randnum.read_random_int(nbits)
key.py 17 '''RSA key generation code.
29 from rsa._compat import b, bytes_type
31 import rsa.prime namespace
32 import rsa.pem namespace
33 import rsa.common namespace
89 '''Represents a public RSA key.
158 from rsa.asn1 import AsnPubKey
170 from rsa.asn1 import AsnPubKey
183 The contents of the file before the "-----BEGIN RSA PUBLIC KEY-----" and
184 after the "-----END RSA PUBLIC KEY-----" lines is ignored
    [all...]
varblock.py 36 from rsa._compat import byte, b
  /external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/tests/
test_transform.py 5 from rsa._compat import b
6 from rsa.transform import int2bytes, bytes2int, _int2bytes
test_common.py 6 from rsa._compat import byte, b
7 from rsa.common import byte_size, bit_size, _bit_size
  /external/curl/tests/certs/scripts/
genserv.sh 70 echo "openssl req -config $PREFIX-sv.prm -newkey rsa:$KEYSIZE -keyout $PREFIX-sv.key -out $PREFIX-sv.csr -passout XXX"
71 $OPENSSL req -config $PREFIX-sv.prm -newkey rsa:$KEYSIZE -keyout $PREFIX-sv.key -out $PREFIX-sv.csr -passout pass:secret
74 echo "openssl rsa -in $PREFIX-sv.key -out $PREFIX-sv.key"
75 $OPENSSL rsa -in $PREFIX-sv.key -out $PREFIX-sv.key -passin pass:secret
78 echo "openssl rsa -in $PREFIX-sv.key -pubout -outform DER -out $PREFIX-sv.pub.der"
79 $OPENSSL rsa -in $PREFIX-sv.key -pubout -outform DER -out $PREFIX-sv.pub.der
81 echo "openssl rsa -in $PREFIX-sv.key -pubout -outform PEM -out $PREFIX-sv.pub.pem"
82 $OPENSSL rsa -in $PREFIX-sv.key -pubout -outform PEM -out $PREFIX-sv.pub.pem
  /system/extras/verity/
verify_boot_signature.c 35 #include <openssl/rsa.h>
308 * Verifies the RSA signature
317 RSA *rsa = NULL; local
333 if ((rsa = EVP_PKEY_get1_RSA(pkey)) == NULL) {
339 bs->signature->data, bs->signature->length, rsa)) {
351 if (rsa) {
352 RSA_free(rsa);
  /system/update_engine/payload_consumer/
payload_verifier.cc 34 // form a sequence of 256 bytes (2048 bits) that is amenable to RSA signing. The
148 RSA* rsa = PEM_read_RSA_PUBKEY(fpubkey, nullptr, nullptr, dummy_password); local
150 TEST_AND_RETURN_FALSE(rsa != nullptr);
151 unsigned int keysize = RSA_size(rsa);
154 RSA_free(rsa);
163 rsa,
165 RSA_free(rsa);
  /external/wpa_supplicant_8/src/crypto/
crypto_libtomcrypt.c 408 rsa_key rsa; member in struct:crypto_public_key
412 rsa_key rsa; member in struct:crypto_private_key
425 res = rsa_import(key, len, &pk->rsa);
434 if (pk->rsa.type != PK_PUBLIC) {
437 rsa_free(&pk->rsa);
457 res = rsa_import(key, len, &pk->rsa);
466 if (pk->rsa.type != PK_PRIVATE) {
469 rsa_free(&pk->rsa);
579 return crypto_rsa_encrypt_pkcs1(2, &key->rsa, PK_PUBLIC, in, inlen,
588 return crypto_rsa_encrypt_pkcs1(1, &key->rsa, PK_PRIVATE, in, inlen
    [all...]
  /system/security/softkeymaster/
keymaster_openssl.cpp 28 #include <openssl/rsa.h>
71 void operator()(RSA* p) const { RSA_free(p); }
73 typedef UniquePtr<RSA, RSA_Delete> Unique_RSA;
343 /* initialize RSA */
344 Unique_RSA rsa(RSA_new());
345 if (rsa.get() == NULL) {
350 if (!RSA_generate_key_ex(rsa.get(), rsa_params->modulus_size, bn.get(), NULL) ||
351 RSA_check_key(rsa.get()) < 0) {
356 if (EVP_PKEY_assign_RSA(pkey, rsa.get()) == 0) {
360 release_because_ownership_transferred(rsa);
    [all...]
  /external/wpa_supplicant_8/hs20/server/ca/
setup.sh 105 $OPENSSL req -config openssl.cnf.tmp -batch -new -newkey rsa:4096 -keyout rootCA/private/cakey.pem -out rootCA/careq.pem || fail "Failed to generate Root CA private key"
126 $OPENSSL req -config openssl.cnf.tmp -batch -new -newkey rsa:2048 -keyout demoCA/private/cakey.pem -out demoCA/careq.pem || fail "Failed to generate Intermediate CA private key"
130 openssl rsa -in demoCA/private/cakey.pem -out demoCA/private/cakey-plain.pem -passin pass:$PASS
143 $OPENSSL req -config $PWD/openssl.cnf.tmp -batch -new -newkey rsa:2048 -nodes -out ocsp.csr -keyout ocsp.key -extensions v3_OCSP
151 $OPENSSL req -config $PWD/openssl.cnf.tmp -batch -new -newkey rsa:2048 -nodes -out server-revoked.csr -keyout server-revoked.key
161 $OPENSSL req -config $PWD/openssl.cnf.tmp -batch -new -newkey rsa:2048 -nodes -out server-client.csr -keyout server-client.key || fail "Could not create server-client.key"
169 $OPENSSL req -config $PWD/openssl.cnf.tmp -batch -new -newkey rsa:2048 -nodes -out user.csr -keyout user.key || fail "Could not create user.key"
186 echo $OPENSSL req -config $PWD/openssl.cnf.tmp -batch -sha256 -new -newkey rsa:2048 -nodes -out server.csr -keyout server.key -reqexts v3_osu_server
187 $OPENSSL req -config $PWD/openssl.cnf.tmp -batch -sha256 -new -newkey rsa:2048 -nodes -out server.csr -keyout server.key -reqexts v3_osu_server || fail "Failed to generate server request"
  /external/vboot_reference/futility/
cmd_vbutil_firmware.c 181 RSAPublicKey *rsa; local
239 rsa = PublicKeyToRSA(&key_block->data_key);
240 if (!rsa) {
247 if (0 != VerifyFirmwarePreamble(preamble, blob_size - now, rsa)) {
285 rsa)) {
  /system/keymaster/
rsa_operation.cpp 79 UniquePtr<EVP_PKEY, EVP_PKEY_Delete> rsa(GetRsaKey(key, error));
80 if (!rsa.get())
83 RsaOperation* op = InstantiateOperation(digest, padding, rsa.release());
166 LOG_E("Input too long: cannot operate on %u bytes of data with %u-byte RSA key",
250 LOG_E("Input too long: %d-byte digest cannot be used with %d-byte RSA key in PSS "
323 UniquePtr<RSA, RSA_Delete> rsa(EVP_PKEY_get1_RSA(const_cast<EVP_PKEY*>(rsa_key_)));
324 if (!rsa.get())
327 if (!output->Reinitialize(RSA_size(rsa.get())))
344 bytes_encrypted = RSA_private_encrypt(key_len, to_encrypt, output->peek_write(), rsa.get()
    [all...]
rsa_keymaster1_key.h 20 #include <openssl/rsa.h>
74 RsaKeymaster1Key(RSA* rsa_key, const AuthorizationSet& hw_enforced,
  /system/tpm/attestation/common/
tpm_utility_v1.cc 26 #include <openssl/rsa.h>
185 LOG(ERROR) << "Only RSA supported on TPM v1.2.";
197 // Create a non-migratable RSA key.
694 crypto::ScopedRSA rsa(RSA_new());
695 CHECK(rsa.get());
698 rsa.get()->e = BN_new();
699 CHECK(rsa.get()->e);
700 BN_set_word(rsa.get()->e, kWellKnownExponent);
702 rsa.get()->e = BN_bin2bn(parms->exponent, parms->exponentSize, nullptr);
703 CHECK(rsa.get()->e)
    [all...]
  /external/boringssl/src/crypto/evp/
evp.c 10 * apply to all code found in this distribution, be it the RC4, RSA,
68 #include <openssl/rsa.h>
221 int EVP_PKEY_set1_RSA(EVP_PKEY *pkey, RSA *key) {
229 int EVP_PKEY_assign_RSA(EVP_PKEY *pkey, RSA *key) {
233 RSA *EVP_PKEY_get0_RSA(EVP_PKEY *pkey) {
238 return pkey->pkey.rsa;
241 RSA *EVP_PKEY_get1_RSA(EVP_PKEY *pkey) {
242 RSA *rsa = EVP_PKEY_get0_RSA(pkey); local
243 if (rsa != NULL)
    [all...]
  /cts/apps/CtsVerifier/
create_test_certs.sh 48 -newkey rsa:2048 \
  /external/google-tv-pairing-protocol/cpp/src/polo/util/
certificateutil.cc 81 RSA* rsa = RSA_generate_key(1025, RSA_F4, NULL, NULL); local
82 EVP_PKEY_assign_RSA(pkey, rsa);
  /external/ipsec-tools/src/racoon/
prsa_tok.l 36 /* This file contains a tokeniser for FreeS/WAN-style ipsec.secrets RSA keys. */
40 #include <openssl/rsa.h>
60 RSA { return TAG_RSA; }
  /external/boringssl/src/crypto/engine/
engine.c 23 #include <openssl/rsa.h>
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/rsa/
RSAUtil.java 1 package org.bouncycastle.jcajce.provider.asymmetric.rsa;
14 * utility class for converting java.security RSA objects into their
  /external/libchrome/crypto/
scoped_openssl_types.h 17 #include <openssl/rsa.h>
55 using ScopedRSA = ScopedOpenSSL<RSA, RSA_free>;
  /external/vboot_reference/host/lib21/include/
host_key2.h 218 * Return the signature algorithm implied by the bit length of an RSA key
220 * @param rsa RSA key
223 enum vb2_signature_algorithm vb2_rsa_sig_alg(struct rsa_st *rsa);
  /libcore/ojluni/src/main/java/sun/security/rsa/
SunRsaSignEntries.java 26 package sun.security.rsa;
45 map.put("KeyFactory.RSA",
46 "sun.security.rsa.RSAKeyFactory");
47 map.put("KeyPairGenerator.RSA",
48 "sun.security.rsa.RSAKeyPairGenerator");
50 "sun.security.rsa.RSASignature$MD2withRSA");
52 "sun.security.rsa.RSASignature$MD5withRSA");
54 "sun.security.rsa.RSASignature$SHA1withRSA");
56 "sun.security.rsa.RSASignature$SHA256withRSA");
58 "sun.security.rsa.RSASignature$SHA384withRSA")
    [all...]

Completed in 302 milliseconds

1 2 34 5 6 7 8 9