/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/func/ |
CipherRSATest.java | 23 CipherRSAThread rsa = new CipherRSAThread("RSA", new int[] {512}, local 28 rsa.launcher(); 30 assertEquals(rsa.getFailureMessages(), 0, rsa.getTotalFailuresNumber()); 35 CipherRSAThread rsa = new CipherRSAThread("RSA", new int[] {1024}, local 40 rsa.launcher(); 42 assertEquals(rsa.getFailureMessages(), 0, rsa.getTotalFailuresNumber()) 47 CipherRSAThread rsa = new CipherRSAThread("RSA", new int[] {2048}, local 57 CipherRSAThread rsa = new CipherRSAThread("RSA", new int[] {1024}, local [all...] |
/external/boringssl/src/decrepit/rsa/ |
rsa_decrepit.c | 10 * apply to all code found in this distribution, be it the RC4, RSA, 57 #include <openssl/rsa.h> 64 RSA *RSA_generate_key(int bits, unsigned long e_value, void *callback, 69 RSA *rsa = RSA_new(); local 72 if (rsa == NULL || 75 !RSA_generate_key_ex(rsa, bits, e, NULL)) { 80 return rsa; 84 RSA_free(rsa); 88 int RSA_padding_add_PKCS1_PSS(RSA *rsa, uint8_t *EM, const uint8_t *mHash [all...] |
/prebuilts/go/darwin-x86/src/crypto/rsa/ |
example_test.go | 5 package rsa package 19 // RSA is able to encrypt only a very limited amount of data. In order 21 // used: RSA is used to encrypt a key for a symmetric primitive like 31 // avoid disclosing whether the received RSA message was well-formed 36 // a buffer that contains a random key. Thus, if the RSA result isn't 39 // crypto/rand.Reader is a good source of entropy for blinding the RSA 44 // we read the random key that will be used if the RSA decryption isn't 56 // instance, if the length of key is impossible given the RSA 58 fmt.Fprintf(os.Stderr, "Error from RSA decryption: %s\n", err) 79 // The RSA ciphertext was badly formed; the decryption wil [all...] |
pss_test.go | 5 package rsa package 86 // The pss-vect.txt file contains RSA keys and then a series of
|
pkcs1v15.go | 5 package rsa package 27 // EncryptPKCS1v15 encrypts the given message with RSA and the padding 36 // session keys is dangerous. Use RSA OAEP in new protocols. 64 // DecryptPKCS1v15 decrypts a plaintext using RSA and the padding scheme from PKCS#1 v1.5. 65 // If rand != nil, it uses RSA blinding to avoid timing side-channel attacks. 86 // DecryptPKCS1v15SessionKey decrypts a session key using RSA and the padding scheme from PKCS#1 v1.5. 87 // If rand != nil, it uses RSA blinding to avoid timing side-channel attacks. 96 // See ``Chosen Ciphertext Attacks Against Protocols Based on the RSA 216 // RSASSA-PKCS1-V1_5-SIGN from RSA PKCS#1 v1.5. Note that hashed must 221 // If rand is not nil then RSA blinding will be used to avoid timin [all...] |
pss.go | 5 package rsa package 9 // [1] https://www.emc.com/collateral/white-papers/h11300-pkcs-1v2-2-rsa-cryptography-standard-wp.pdf 33 return nil, errors.New("crypto/rsa: input must be hashed message") 39 return nil, errors.New("crypto/rsa: encoding error")
|
pkcs1v15_test.go | 5 package rsa package 231 t.Error("RSA decrypted a message that was too long.") 241 // Where "key" contains the RSA private key given at the bottom of this 278 // -----BEGIN RSA PRIVATE KEY----- 286 // -----END RSA PRIVATE KEY-----
|
rsa_test.go | 5 package rsa package 77 // This test ensures that trying to generate toy RSA keys doesn't enter 275 // testEncryptOAEPData contains a subset of the vectors from RSA's "Test vectors for RSA-OAEP".
|
/prebuilts/go/linux-x86/src/crypto/rsa/ |
example_test.go | 5 package rsa package 19 // RSA is able to encrypt only a very limited amount of data. In order 21 // used: RSA is used to encrypt a key for a symmetric primitive like 31 // avoid disclosing whether the received RSA message was well-formed 36 // a buffer that contains a random key. Thus, if the RSA result isn't 39 // crypto/rand.Reader is a good source of entropy for blinding the RSA 44 // we read the random key that will be used if the RSA decryption isn't 56 // instance, if the length of key is impossible given the RSA 58 fmt.Fprintf(os.Stderr, "Error from RSA decryption: %s\n", err) 79 // The RSA ciphertext was badly formed; the decryption wil [all...] |
pss_test.go | 5 package rsa package 86 // The pss-vect.txt file contains RSA keys and then a series of
|
pkcs1v15.go | 5 package rsa package 27 // EncryptPKCS1v15 encrypts the given message with RSA and the padding 36 // session keys is dangerous. Use RSA OAEP in new protocols. 64 // DecryptPKCS1v15 decrypts a plaintext using RSA and the padding scheme from PKCS#1 v1.5. 65 // If rand != nil, it uses RSA blinding to avoid timing side-channel attacks. 86 // DecryptPKCS1v15SessionKey decrypts a session key using RSA and the padding scheme from PKCS#1 v1.5. 87 // If rand != nil, it uses RSA blinding to avoid timing side-channel attacks. 96 // See ``Chosen Ciphertext Attacks Against Protocols Based on the RSA 216 // RSASSA-PKCS1-V1_5-SIGN from RSA PKCS#1 v1.5. Note that hashed must 221 // If rand is not nil then RSA blinding will be used to avoid timin [all...] |
pss.go | 5 package rsa package 9 // [1] https://www.emc.com/collateral/white-papers/h11300-pkcs-1v2-2-rsa-cryptography-standard-wp.pdf 33 return nil, errors.New("crypto/rsa: input must be hashed message") 39 return nil, errors.New("crypto/rsa: encoding error")
|
/external/ipsec-tools/src/racoon/ |
rsalist.h | 38 #include <openssl/rsa.h> 52 RSA *rsa; member in struct:rsa_key 55 int rsa_key_insert(struct genlist *list, struct netaddr *src, struct netaddr *dst, RSA *rsa); 59 RSA *rsa_try_check_rsasign(vchar_t *source, vchar_t *sig, struct genlist *list);
|
/bootable/recovery/ |
verifier.h | 25 #include <openssl/rsa.h> 29 void operator()(RSA* rsa) const { 30 RSA_free(rsa); 48 std::unique_ptr<RSA, RSADeleter>&& rsa_, 52 rsa(std::move(rsa_)), 58 std::unique_ptr<RSA, RSADeleter> rsa; member in struct:Certificate
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/rsa/ |
KeyPairGeneratorSpi.java | 1 package org.bouncycastle.jcajce.provider.asymmetric.rsa; 33 super("RSA");
|
RSAUtil.java | 1 package org.bouncycastle.jcajce.provider.asymmetric.rsa; 14 * utility class for converting java.security RSA objects into their
|
KeyFactorySpi.java | 1 package org.bouncycastle.jcajce.provider.asymmetric.rsa;
|
/external/curl/docs/examples/ |
usercertinmem.c | 23 * Use an in-memory user certificate and RSA key and retrieve an https page. 49 RSA *rsa = NULL; local 95 /*replace the XXX with the actual RSA key*/ 97 "-----BEGIN RSA PRIVATE KEY-----\n"\ 114 "-----END RSA PRIVATE KEY-----\n"; 140 /*create a bio for the RSA key*/ 146 /*read the key bio into an RSA object*/ 147 rsa = PEM_read_bio_RSAPrivateKey(kbio, NULL, 0, NULL); 148 if(rsa == NULL) [all...] |
/external/google-tv-pairing-protocol/cpp/src/polo/util/ |
certificateutil.cc | 81 RSA* rsa = RSA_generate_key(1025, RSA_F4, NULL, NULL); local 82 EVP_PKEY_assign_RSA(pkey, rsa);
|
/external/google-tv-pairing-protocol/cpp/tests/polo/util/ |
certificateutiltest.cc | 56 std::string rsa_string = "-----BEGIN RSA PRIVATE KEY-----\n" 70 "-----END RSA PRIVATE KEY-----\n"; 73 RSA* rsa = PEM_read_bio_RSAPrivateKey(rsa_bio, NULL, NULL, NULL); local 76 EVP_PKEY_assign_RSA(pkey, rsa); 116 std::string pem = "-----BEGIN RSA PRIVATE KEY-----\n" 133 "-----END RSA PRIVATE KEY-----\n"; 139 RSA* rsa = EVP_PKEY_get1_RSA(pkey); local 140 ASSERT_TRUE(rsa); 148 RSA* rsa = RSA_generate_key(1025, RSA_F4, NULL, NULL); local [all...] |
/system/extras/verity/ |
generate_verity_key.c | 31 #include <openssl/rsa.h> 34 static int write_public_keyfile(RSA *private_key, const char *private_key_path) 66 RSA *rsa = NULL; local 91 rsa = EVP_PKEY_get1_RSA(pkey); 92 if (!rsa) { 93 printf("Failed to get the RSA public key from '%s'\n", pem_file); 97 if (write_public_keyfile(rsa, key_file) < 0) { 114 if (rsa) { 115 RSA_free(rsa); 125 RSA* rsa = RSA_new(); local [all...] |
/system/tpm/trunks/ |
session_manager_test.cc | 66 TPM2B_PUBLIC_KEY_RSA rsa; local 67 rsa.size = bytes.size(); 68 memcpy(rsa.buffer, bytes.data(), bytes.size()); 69 return rsa; 105 public_data.public_area.unique.rsa = GetValidRSAPublicKey(); 121 public_data.public_area.unique.rsa.size = 32; 128 public_data.public_area.unique.rsa.size = 256; 139 public_data.public_area.unique.rsa = GetValidRSAPublicKey(); 154 public_data.public_area.unique.rsa = GetValidRSAPublicKey();
|
/system/update_engine/payload_consumer/ |
payload_verifier.cc | 34 // form a sequence of 256 bytes (2048 bits) that is amenable to RSA signing. The 148 RSA* rsa = PEM_read_RSA_PUBKEY(fpubkey, nullptr, nullptr, dummy_password); local 150 TEST_AND_RETURN_FALSE(rsa != nullptr); 151 unsigned int keysize = RSA_size(rsa); 154 RSA_free(rsa); 163 rsa, 165 RSA_free(rsa);
|
/device/linaro/bootloader/arm-trusted-firmware/tools/cert_create/src/ |
key.c | 47 RSA *rsa = NULL; local 51 printf("Cannot create RSA exponent\n"); 56 printf("Cannot assign RSA exponent\n"); 60 rsa = RSA_new(); 61 if (rsa == NULL) { 62 printf("Cannot create RSA key\n"); 66 if (!RSA_generate_key_ex(rsa, RSA_KEY_BITS, e, NULL)) { 67 printf("Cannot generate RSA key\n"); 71 if (!EVP_PKEY_assign_RSA(key->key, rsa)) { [all...] |
/external/boringssl/src/crypto/evp/ |
p_rsa_asn1.c | 63 #include <openssl/rsa.h> 65 #include "../fipsmodule/rsa/internal.h" 79 !RSA_marshal_public_key(&key_bitstring, key->pkey.rsa) || 100 RSA *rsa = RSA_parse_public_key(key); local 101 if (rsa == NULL || CBS_len(key) != 0) { 103 RSA_free(rsa); 107 EVP_PKEY_assign_RSA(out, rsa); 112 return BN_cmp(b->pkey.rsa->n, a->pkey.rsa->n) == 0 & 144 RSA *rsa = RSA_parse_private_key(key); local [all...] |