HomeSort by relevance Sort by last modified time
    Searched refs:RSA (Results 1 - 25 of 299) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/boringssl/src/crypto/rsa_extra/
rsa_asn1.c 56 #include <openssl/rsa.h>
67 #include "../fipsmodule/rsa/internal.h"
83 // An RSA object may be missing some components.
84 OPENSSL_PUT_ERROR(RSA, RSA_R_VALUE_MISSING);
90 RSA *RSA_parse_public_key(CBS *cbs) {
91 RSA *ret = RSA_new();
100 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_ENCODING);
107 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_RSA_PARAMETERS);
115 RSA *RSA_public_key_from_bytes(const uint8_t *in, size_t in_len) {
118 RSA *ret = RSA_parse_public_key(&cbs)
    [all...]
  /external/boringssl/src/include/openssl/
rsa.h 10 * apply to all code found in this distribution, be it the RC4, RSA,
71 // rsa.h contains functions for handling encryption and signature using RSA.
76 // RSA_new returns a new, empty RSA object or NULL on error.
77 OPENSSL_EXPORT RSA *RSA_new(void);
80 OPENSSL_EXPORT RSA *RSA_new_method(const ENGINE *engine);
82 // RSA_free decrements the reference count of |rsa| and frees it if the
84 OPENSSL_EXPORT void RSA_free(RSA *rsa);
86 // RSA_up_ref increments the reference count of |rsa| and returns one
    [all...]
  /system/core/libcrypto_utils/include/crypto_utils/
android_pubkey.h 24 #include <openssl/rsa.h>
30 // Size of an RSA modulus such as an encrypted block or a signature.
33 // Size of an encoded RSA key.
37 /* Allocates a new RSA |key| object, decodes a public RSA key stored in
47 bool android_pubkey_decode(const uint8_t* key_buffer, size_t size, RSA** key);
49 /* Encodes |key| in the Android RSA public key binary format and stores the
55 bool android_pubkey_encode(const RSA* key, uint8_t* key_buffer, size_t size);
  /external/ipsec-tools/src/racoon/
rsalist.h 38 #include <openssl/rsa.h>
52 RSA *rsa; member in struct:rsa_key
55 int rsa_key_insert(struct genlist *list, struct netaddr *src, struct netaddr *dst, RSA *rsa);
59 RSA *rsa_try_check_rsasign(vchar_t *source, vchar_t *sig, struct genlist *list);
  /system/keymaster/include/keymaster/km_openssl/
rsa_key.h 20 #include <openssl/rsa.h>
39 void operator()(RSA* p) { RSA_free(p); }
42 RSA* key() const { return rsa_key_.get(); }
45 RsaKey(RSA* rsa, AuthorizationSet&& hw_enforced, AuthorizationSet&& sw_enforced,
47 : AsymmetricKey(move(hw_enforced), move(sw_enforced), key_factory), rsa_key_(rsa) {}
50 UniquePtr<RSA, RSA_Delete> rsa_key_;
  /external/boringssl/src/crypto/pem/
pem_all.c 10 * apply to all code found in this distribution, be it the RC4, RSA,
119 #include <openssl/rsa.h>
122 static RSA *pkey_get_rsa(EVP_PKEY *key, RSA **rsa);
132 * We treat RSA or DSA private keys as a special case. For private keys we
137 static RSA *pkey_get_rsa(EVP_PKEY *key, RSA **rsa)
139 RSA *rtmp
    [all...]
  /external/vboot_reference/host/lib/include/
host_key.h 15 typedef struct rsa_st RSA;
19 RSA* rsa_private_key; /* Private key data */
  /external/boringssl/src/crypto/fipsmodule/rsa/
rsa.c 10 * apply to all code found in this distribution, be it the RC4, RSA,
57 #include <openssl/rsa.h>
81 RSA *RSA_new(void) { return RSA_new_method(NULL); }
83 RSA *RSA_new_method(const ENGINE *engine) {
84 RSA *rsa = OPENSSL_malloc(sizeof(RSA)); local
85 if (rsa == NULL) {
86 OPENSSL_PUT_ERROR(RSA, ERR_R_MALLOC_FAILURE);
90 OPENSSL_memset(rsa, 0, sizeof(RSA))
107 CRYPTO_free_ex_data(g_rsa_ex_data_class_bss_get(), rsa, &rsa->ex_data); local
133 CRYPTO_free_ex_data(g_rsa_ex_data_class_bss_get(), rsa, &rsa->ex_data); local
    [all...]
internal.h 10 * apply to all code found in this distribution, be it the RC4, RSA,
70 // Default implementations of RSA operations.
74 size_t rsa_default_size(const RSA *rsa);
75 int rsa_default_sign_raw(RSA *rsa, size_t *out_len, uint8_t *out,
78 int rsa_default_decrypt(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out,
80 int rsa_default_private_transform(RSA *rsa, uint8_t *out, const uint8_t *in
    [all...]
padding.c 56 #include <openssl/rsa.h>
79 OPENSSL_PUT_ERROR(RSA, RSA_R_KEY_SIZE_TOO_SMALL);
84 OPENSSL_PUT_ERROR(RSA, RSA_R_DIGEST_TOO_BIG_FOR_RSA_KEY);
102 OPENSSL_PUT_ERROR(RSA, RSA_R_DATA_TOO_SMALL);
108 OPENSSL_PUT_ERROR(RSA, RSA_R_BLOCK_TYPE_IS_NOT_01);
120 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_FIXED_HEADER_DECRYPT);
126 OPENSSL_PUT_ERROR(RSA, RSA_R_NULL_BEFORE_BLOCK_MISSING);
131 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_PAD_BYTE_COUNT);
139 OPENSSL_PUT_ERROR(RSA, RSA_R_DATA_TOO_LARGE);
168 OPENSSL_PUT_ERROR(RSA, RSA_R_KEY_SIZE_TOO_SMALL)
    [all...]
rsa_impl.c 10 * apply to all code found in this distribution, be it the RC4, RSA,
57 #include <openssl/rsa.h>
75 static int check_modulus_and_exponent_sizes(const RSA *rsa) {
76 unsigned rsa_bits = BN_num_bits(rsa->n);
79 OPENSSL_PUT_ERROR(RSA, RSA_R_MODULUS_TOO_LARGE);
94 if (BN_num_bits(rsa->e) > kMaxExponentBits) {
95 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_E_VALUE);
101 // is much smaller than the minimum RSA key size that any application should
104 OPENSSL_PUT_ERROR(RSA, RSA_R_KEY_SIZE_TOO_SMALL)
    [all...]
blinding.c 62 * apply to all code found in this distribution, be it the RC4, RSA,
109 #include <openssl/rsa.h>
135 OPENSSL_PUT_ERROR(RSA, ERR_R_MALLOC_FAILURE);
222 OPENSSL_PUT_ERROR(RSA, ERR_R_INTERNAL_ERROR);
229 OPENSSL_PUT_ERROR(RSA, ERR_R_INTERNAL_ERROR);
239 OPENSSL_PUT_ERROR(RSA, ERR_R_INTERNAL_ERROR);
243 // For reasonably-sized RSA keys, it should almost never be the case that a
246 OPENSSL_PUT_ERROR(RSA, RSA_R_TOO_MANY_ITERATIONS);
253 OPENSSL_PUT_ERROR(RSA, ERR_R_INTERNAL_ERROR);
258 OPENSSL_PUT_ERROR(RSA, ERR_R_INTERNAL_ERROR)
    [all...]
  /external/boringssl/src/decrepit/rsa/
rsa_decrepit.c 10 * apply to all code found in this distribution, be it the RC4, RSA,
57 #include <openssl/rsa.h>
64 RSA *RSA_generate_key(int bits, unsigned long e_value, void *callback,
69 RSA *rsa = RSA_new(); local
72 if (rsa == NULL ||
75 !RSA_generate_key_ex(rsa, bits, e, NULL)) {
80 return rsa;
84 RSA_free(rsa);
88 int RSA_padding_add_PKCS1_PSS(RSA *rsa, uint8_t *EM, const uint8_t *mHash
    [all...]
  /system/security/keystore-engine/
methods.h 47 void operator()(RSA* p) const {
51 typedef std::unique_ptr<RSA, struct RSA_Delete> Unique_RSA;
72 /* RSA */
  /bootable/recovery/
verifier.h 25 #include <openssl/rsa.h>
29 void operator()(RSA* rsa) const {
30 RSA_free(rsa);
48 std::unique_ptr<RSA, RSADeleter>&& rsa_,
52 rsa(std::move(rsa_)),
58 std::unique_ptr<RSA, RSADeleter> rsa; member in struct:Certificate
  /device/linaro/bootloader/edk2/CryptoPkg/Library/BaseCryptLib/Pk/
CryptRsaExt.c 2 RSA Asymmetric Cipher Wrapper Implementation over OpenSSL.
4 This file implements following APIs which provide more capabilities for RSA:
24 #include <openssl/rsa.h>
29 Gets the tag-designated RSA key component from the established RSA context.
31 This function retrieves the tag-designated RSA key component from the
32 established RSA context as a non-negative integer (octet string format
33 represented in RSA PKCS#1).
43 @param[in, out] RsaContext Pointer to RSA context being set.
44 @param[in] KeyTag Tag of RSA key component being set.
    [all...]
  /external/boringssl/src/crypto/x509/
x_all.c 10 * apply to all code found in this distribution, be it the RC4, RSA,
62 #include <openssl/rsa.h>
202 RSA *d2i_RSAPrivateKey_fp(FILE *fp, RSA **rsa)
204 return ASN1_d2i_fp_of(RSA, RSA_new, d2i_RSAPrivateKey, fp, rsa);
207 int i2d_RSAPrivateKey_fp(FILE *fp, RSA *rsa)
209 return ASN1_i2d_fp_of_const(RSA, i2d_RSAPrivateKey, fp, rsa)
    [all...]
  /external/avb/test/
avb_atx_generate_test_data 55 openssl genpkey -algorithm RSA -pkeyopt rsa_keygen_bits:4096 -outform PEM \
59 openssl genpkey -algorithm RSA -pkeyopt rsa_keygen_bits:4096 -outform PEM \
63 openssl genpkey -algorithm RSA -pkeyopt rsa_keygen_bits:4096 -outform PEM \
  /system/core/adb/
adb_auth.h 25 #include <openssl/rsa.h>
40 std::deque<std::shared_ptr<RSA>> adb_auth_get_private_keys();
  /system/keymaster/include/keymaster/legacy_support/
keymaster0_engine.h 25 #include <openssl/rsa.h>
35 /* Keymaster0Engine is a BoringSSL ENGINE that implements RSA & EC by forwarding the requested
57 RSA* BlobToRsaKey(const KeymasterKeyBlob& blob) const;
60 const keymaster_key_blob_t* RsaKeyToBlob(const RSA* rsa) const;
61 const keymaster_key_blob_t* EcKeyToBlob(const EC_KEY* rsa) const;
75 static int rsa_private_transform(RSA* rsa, uint8_t* out, const uint8_t* in, size_t len);
88 int RsaPrivateTransform(RSA* rsa, uint8_t* out, const uint8_t* in, size_t len) const
    [all...]
keymaster1_engine.h 25 #include <openssl/rsa.h>
71 RSA* BuildRsaKey(const KeymasterKeyBlob& blob, const AuthorizationSet& additional_params,
77 KeyData* GetData(const RSA* rsa) const;
78 KeyData* GetData(const EC_KEY* rsa) const;
103 static int rsa_sign_raw(RSA* rsa, size_t* out_len, uint8_t* out, size_t max_out,
105 static int rsa_decrypt(RSA* rsa, size_t* out_len, uint8_t* out, size_t max_out,
  /prebuilts/go/darwin-x86/src/crypto/x509/
pem_decrypt_test.go 49 block, err := EncryptPEMBlock(rand.Reader, "RSA PRIVATE KEY", plainDER, password, data.kind)
57 if block.Type != "RSA PRIVATE KEY" {
58 t.Errorf("unexpected block type; got %q want %q", block.Type, "RSA PRIVATE KEY")
84 -----BEGIN RSA PRIVATE KEY-----
95 -----END RSA PRIVATE KEY-----`),
109 -----BEGIN RSA PRIVATE KEY-----
120 -----END RSA PRIVATE KEY-----`),
134 -----BEGIN RSA PRIVATE KEY-----
145 -----END RSA PRIVATE KEY-----`),
159 -----BEGIN RSA PRIVATE KEY----
    [all...]
  /prebuilts/go/linux-x86/src/crypto/x509/
pem_decrypt_test.go 49 block, err := EncryptPEMBlock(rand.Reader, "RSA PRIVATE KEY", plainDER, password, data.kind)
57 if block.Type != "RSA PRIVATE KEY" {
58 t.Errorf("unexpected block type; got %q want %q", block.Type, "RSA PRIVATE KEY")
84 -----BEGIN RSA PRIVATE KEY-----
95 -----END RSA PRIVATE KEY-----`),
109 -----BEGIN RSA PRIVATE KEY-----
120 -----END RSA PRIVATE KEY-----`),
134 -----BEGIN RSA PRIVATE KEY-----
145 -----END RSA PRIVATE KEY-----`),
159 -----BEGIN RSA PRIVATE KEY----
    [all...]
  /external/google-tv-pairing-protocol/cpp/tests/polo/util/
certificateutiltest.cc 56 std::string rsa_string = "-----BEGIN RSA PRIVATE KEY-----\n"
70 "-----END RSA PRIVATE KEY-----\n";
73 RSA* rsa = PEM_read_bio_RSAPrivateKey(rsa_bio, NULL, NULL, NULL); local
76 EVP_PKEY_assign_RSA(pkey, rsa);
116 std::string pem = "-----BEGIN RSA PRIVATE KEY-----\n"
133 "-----END RSA PRIVATE KEY-----\n";
139 RSA* rsa = EVP_PKEY_get1_RSA(pkey); local
140 ASSERT_TRUE(rsa);
148 RSA* rsa = RSA_generate_key(1025, RSA_F4, NULL, NULL); local
    [all...]
  /system/extras/verity/
generate_verity_key.c 31 #include <openssl/rsa.h>
34 static int write_public_keyfile(RSA *private_key, const char *private_key_path)
66 RSA *rsa = NULL; local
91 rsa = EVP_PKEY_get1_RSA(pkey);
92 if (!rsa) {
93 printf("Failed to get the RSA public key from '%s'\n", pem_file);
97 if (write_public_keyfile(rsa, key_file) < 0) {
114 if (rsa) {
115 RSA_free(rsa);
125 RSA* rsa = RSA_new(); local
    [all...]

Completed in 273 milliseconds

1 2 3 4 5 6 7 8 91011>>