HomeSort by relevance Sort by last modified time
    Searched defs:rsa (Results 1 - 25 of 90) sorted by null

1 2 3 4

  /libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/func/
CipherRSATest.java 23 CipherRSAThread rsa = new CipherRSAThread("RSA", new int[] {512}, local
28 rsa.launcher();
30 assertEquals(rsa.getFailureMessages(), 0, rsa.getTotalFailuresNumber());
35 CipherRSAThread rsa = new CipherRSAThread("RSA", new int[] {1024}, local
40 rsa.launcher();
42 assertEquals(rsa.getFailureMessages(), 0, rsa.getTotalFailuresNumber())
47 CipherRSAThread rsa = new CipherRSAThread("RSA", new int[] {2048}, local
57 CipherRSAThread rsa = new CipherRSAThread("RSA", new int[] {1024}, local
    [all...]
  /external/boringssl/src/decrepit/rsa/
rsa_decrepit.c 10 * apply to all code found in this distribution, be it the RC4, RSA,
57 #include <openssl/rsa.h>
64 RSA *RSA_generate_key(int bits, unsigned long e_value, void *callback,
69 RSA *rsa = RSA_new(); local
72 if (rsa == NULL ||
75 !RSA_generate_key_ex(rsa, bits, e, NULL)) {
80 return rsa;
84 RSA_free(rsa);
88 int RSA_padding_add_PKCS1_PSS(RSA *rsa, uint8_t *EM, const uint8_t *mHash
    [all...]
  /prebuilts/go/darwin-x86/src/crypto/rsa/
example_test.go 5 package rsa package
19 // RSA is able to encrypt only a very limited amount of data. In order
21 // used: RSA is used to encrypt a key for a symmetric primitive like
31 // avoid disclosing whether the received RSA message was well-formed
36 // a buffer that contains a random key. Thus, if the RSA result isn't
39 // crypto/rand.Reader is a good source of entropy for blinding the RSA
44 // we read the random key that will be used if the RSA decryption isn't
56 // instance, if the length of key is impossible given the RSA
58 fmt.Fprintf(os.Stderr, "Error from RSA decryption: %s\n", err)
79 // The RSA ciphertext was badly formed; the decryption wil
    [all...]
pss_test.go 5 package rsa package
86 // The pss-vect.txt file contains RSA keys and then a series of
pkcs1v15.go 5 package rsa package
27 // EncryptPKCS1v15 encrypts the given message with RSA and the padding
36 // session keys is dangerous. Use RSA OAEP in new protocols.
64 // DecryptPKCS1v15 decrypts a plaintext using RSA and the padding scheme from PKCS#1 v1.5.
65 // If rand != nil, it uses RSA blinding to avoid timing side-channel attacks.
86 // DecryptPKCS1v15SessionKey decrypts a session key using RSA and the padding scheme from PKCS#1 v1.5.
87 // If rand != nil, it uses RSA blinding to avoid timing side-channel attacks.
96 // See ``Chosen Ciphertext Attacks Against Protocols Based on the RSA
216 // RSASSA-PKCS1-V1_5-SIGN from RSA PKCS#1 v1.5. Note that hashed must
221 // If rand is not nil then RSA blinding will be used to avoid timin
    [all...]
pss.go 5 package rsa package
9 // [1] https://www.emc.com/collateral/white-papers/h11300-pkcs-1v2-2-rsa-cryptography-standard-wp.pdf
33 return nil, errors.New("crypto/rsa: input must be hashed message")
39 return nil, errors.New("crypto/rsa: encoding error")
pkcs1v15_test.go 5 package rsa package
231 t.Error("RSA decrypted a message that was too long.")
241 // Where "key" contains the RSA private key given at the bottom of this
278 // -----BEGIN RSA PRIVATE KEY-----
286 // -----END RSA PRIVATE KEY-----
rsa_test.go 5 package rsa package
77 // This test ensures that trying to generate toy RSA keys doesn't enter
275 // testEncryptOAEPData contains a subset of the vectors from RSA's "Test vectors for RSA-OAEP".
  /prebuilts/go/linux-x86/src/crypto/rsa/
example_test.go 5 package rsa package
19 // RSA is able to encrypt only a very limited amount of data. In order
21 // used: RSA is used to encrypt a key for a symmetric primitive like
31 // avoid disclosing whether the received RSA message was well-formed
36 // a buffer that contains a random key. Thus, if the RSA result isn't
39 // crypto/rand.Reader is a good source of entropy for blinding the RSA
44 // we read the random key that will be used if the RSA decryption isn't
56 // instance, if the length of key is impossible given the RSA
58 fmt.Fprintf(os.Stderr, "Error from RSA decryption: %s\n", err)
79 // The RSA ciphertext was badly formed; the decryption wil
    [all...]
pss_test.go 5 package rsa package
86 // The pss-vect.txt file contains RSA keys and then a series of
pkcs1v15.go 5 package rsa package
27 // EncryptPKCS1v15 encrypts the given message with RSA and the padding
36 // session keys is dangerous. Use RSA OAEP in new protocols.
64 // DecryptPKCS1v15 decrypts a plaintext using RSA and the padding scheme from PKCS#1 v1.5.
65 // If rand != nil, it uses RSA blinding to avoid timing side-channel attacks.
86 // DecryptPKCS1v15SessionKey decrypts a session key using RSA and the padding scheme from PKCS#1 v1.5.
87 // If rand != nil, it uses RSA blinding to avoid timing side-channel attacks.
96 // See ``Chosen Ciphertext Attacks Against Protocols Based on the RSA
216 // RSASSA-PKCS1-V1_5-SIGN from RSA PKCS#1 v1.5. Note that hashed must
221 // If rand is not nil then RSA blinding will be used to avoid timin
    [all...]
pss.go 5 package rsa package
9 // [1] https://www.emc.com/collateral/white-papers/h11300-pkcs-1v2-2-rsa-cryptography-standard-wp.pdf
33 return nil, errors.New("crypto/rsa: input must be hashed message")
39 return nil, errors.New("crypto/rsa: encoding error")
  /external/ipsec-tools/src/racoon/
rsalist.h 38 #include <openssl/rsa.h>
52 RSA *rsa; member in struct:rsa_key
55 int rsa_key_insert(struct genlist *list, struct netaddr *src, struct netaddr *dst, RSA *rsa);
59 RSA *rsa_try_check_rsasign(vchar_t *source, vchar_t *sig, struct genlist *list);
  /bootable/recovery/
verifier.h 25 #include <openssl/rsa.h>
29 void operator()(RSA* rsa) const {
30 RSA_free(rsa);
48 std::unique_ptr<RSA, RSADeleter>&& rsa_,
52 rsa(std::move(rsa_)),
58 std::unique_ptr<RSA, RSADeleter> rsa; member in struct:Certificate
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/rsa/
KeyPairGeneratorSpi.java 1 package org.bouncycastle.jcajce.provider.asymmetric.rsa;
33 super("RSA");
RSAUtil.java 1 package org.bouncycastle.jcajce.provider.asymmetric.rsa;
14 * utility class for converting java.security RSA objects into their
KeyFactorySpi.java 1 package org.bouncycastle.jcajce.provider.asymmetric.rsa;
  /external/curl/docs/examples/
usercertinmem.c 23 * Use an in-memory user certificate and RSA key and retrieve an https page.
49 RSA *rsa = NULL; local
95 /*replace the XXX with the actual RSA key*/
97 "-----BEGIN RSA PRIVATE KEY-----\n"\
114 "-----END RSA PRIVATE KEY-----\n";
140 /*create a bio for the RSA key*/
146 /*read the key bio into an RSA object*/
147 rsa = PEM_read_bio_RSAPrivateKey(kbio, NULL, 0, NULL);
148 if(rsa == NULL)
    [all...]
  /external/google-tv-pairing-protocol/cpp/src/polo/util/
certificateutil.cc 81 RSA* rsa = RSA_generate_key(1025, RSA_F4, NULL, NULL); local
82 EVP_PKEY_assign_RSA(pkey, rsa);
  /external/google-tv-pairing-protocol/cpp/tests/polo/util/
certificateutiltest.cc 56 std::string rsa_string = "-----BEGIN RSA PRIVATE KEY-----\n"
70 "-----END RSA PRIVATE KEY-----\n";
73 RSA* rsa = PEM_read_bio_RSAPrivateKey(rsa_bio, NULL, NULL, NULL); local
76 EVP_PKEY_assign_RSA(pkey, rsa);
116 std::string pem = "-----BEGIN RSA PRIVATE KEY-----\n"
133 "-----END RSA PRIVATE KEY-----\n";
139 RSA* rsa = EVP_PKEY_get1_RSA(pkey); local
140 ASSERT_TRUE(rsa);
148 RSA* rsa = RSA_generate_key(1025, RSA_F4, NULL, NULL); local
    [all...]
  /system/extras/verity/
generate_verity_key.c 31 #include <openssl/rsa.h>
34 static int write_public_keyfile(RSA *private_key, const char *private_key_path)
66 RSA *rsa = NULL; local
91 rsa = EVP_PKEY_get1_RSA(pkey);
92 if (!rsa) {
93 printf("Failed to get the RSA public key from '%s'\n", pem_file);
97 if (write_public_keyfile(rsa, key_file) < 0) {
114 if (rsa) {
115 RSA_free(rsa);
125 RSA* rsa = RSA_new(); local
    [all...]
  /system/tpm/trunks/
session_manager_test.cc 66 TPM2B_PUBLIC_KEY_RSA rsa; local
67 rsa.size = bytes.size();
68 memcpy(rsa.buffer, bytes.data(), bytes.size());
69 return rsa;
105 public_data.public_area.unique.rsa = GetValidRSAPublicKey();
121 public_data.public_area.unique.rsa.size = 32;
128 public_data.public_area.unique.rsa.size = 256;
139 public_data.public_area.unique.rsa = GetValidRSAPublicKey();
154 public_data.public_area.unique.rsa = GetValidRSAPublicKey();
  /system/update_engine/payload_consumer/
payload_verifier.cc 34 // form a sequence of 256 bytes (2048 bits) that is amenable to RSA signing. The
148 RSA* rsa = PEM_read_RSA_PUBKEY(fpubkey, nullptr, nullptr, dummy_password); local
150 TEST_AND_RETURN_FALSE(rsa != nullptr);
151 unsigned int keysize = RSA_size(rsa);
154 RSA_free(rsa);
163 rsa,
165 RSA_free(rsa);
  /device/linaro/bootloader/arm-trusted-firmware/tools/cert_create/src/
key.c 47 RSA *rsa = NULL; local
51 printf("Cannot create RSA exponent\n");
56 printf("Cannot assign RSA exponent\n");
60 rsa = RSA_new();
61 if (rsa == NULL) {
62 printf("Cannot create RSA key\n");
66 if (!RSA_generate_key_ex(rsa, RSA_KEY_BITS, e, NULL)) {
67 printf("Cannot generate RSA key\n");
71 if (!EVP_PKEY_assign_RSA(key->key, rsa)) {
    [all...]
  /external/boringssl/src/crypto/evp/
p_rsa_asn1.c 63 #include <openssl/rsa.h>
65 #include "../fipsmodule/rsa/internal.h"
79 !RSA_marshal_public_key(&key_bitstring, key->pkey.rsa) ||
100 RSA *rsa = RSA_parse_public_key(key); local
101 if (rsa == NULL || CBS_len(key) != 0) {
103 RSA_free(rsa);
107 EVP_PKEY_assign_RSA(out, rsa);
112 return BN_cmp(b->pkey.rsa->n, a->pkey.rsa->n) == 0 &
144 RSA *rsa = RSA_parse_private_key(key); local
    [all...]

Completed in 410 milliseconds

1 2 3 4