/external/ipsec-tools/src/racoon/ |
rsalist.c | 71 struct rsa_key *rsa_key; local 73 rsa_key = calloc(sizeof(struct rsa_key), 1); 74 rsa_key->rsa = rsa; 77 rsa_key->src = src; 79 rsa_key->src = calloc(sizeof(*rsa_key->src), 1); 82 rsa_key->dst = dst; 84 rsa_key->dst = calloc(sizeof(*rsa_key->dst), 1) [all...] |
rsalist.h | 49 struct rsa_key { struct
|
oakley.c | [all...] |
/external/vboot_reference/futility/ |
cmd_create.c | 81 RSA *rsa_key = 0; local 95 rsa_key = PEM_read_RSAPrivateKey(fp, NULL, NULL, NULL); 98 if (!rsa_key) { 103 sig_alg = vb2_rsa_sig_alg(rsa_key); 118 privkey->rsa_private_key = rsa_key; 130 ret = vb_keyb_from_rsa(rsa_key, &keyb_data, &keyb_size); 155 RSA_free(rsa_key); 163 RSA *rsa_key = 0; local 178 rsa_key = PEM_read_RSAPrivateKey(fp, NULL, NULL, NULL); 181 if (!rsa_key) { [all...] |
/system/keymaster/km_openssl/ |
rsa_key_factory.cpp | 22 #include <keymaster/km_openssl/rsa_key.h> 82 UniquePtr<RSA, RsaKey::RSA_Delete> rsa_key(RSA_new()); 84 if (exponent.get() == NULL || rsa_key.get() == NULL || pkey.get() == NULL) 88 !RSA_generate_key_ex(rsa_key.get(), key_size, exponent.get(), NULL /* callback */)) 91 if (EVP_PKEY_set1_RSA(pkey.get(), rsa_key.get()) != 1) 139 UniquePtr<RSA, RsaKey::RSA_Delete> rsa_key(EVP_PKEY_get1_RSA(pkey.get())); 140 if (!rsa_key.get()) 145 *public_exponent = BN_get_word(rsa_key->e); 150 if (*public_exponent != BN_get_word(rsa_key->e)) { 152 *public_exponent, BN_get_word(rsa_key->e)) [all...] |
rsa_key.cpp | 17 #include <keymaster/km_openssl/rsa_key.h>
|
rsa_operation.cpp | 25 #include <keymaster/km_openssl/rsa_key.h> 39 const RsaKey& rsa_key = static_cast<RsaKey&>(key); local 40 if (!rsa_key.key()) { 46 if (!rsa_key.InternalToEvp(pkey.get())) {
|
/system/keymaster/include/keymaster/legacy_support/ |
rsa_keymaster0_key.h | 22 #include <keymaster/km_openssl/rsa_key.h> 62 RsaKeymaster0Key(RSA* rsa_key, AuthorizationSet&& hw_enforced, 65 : RsaKey(rsa_key, move(hw_enforced), move(sw_enforced), key_factory) {}
|
rsa_keymaster1_key.h | 22 #include <keymaster/km_openssl/rsa_key.h> 74 RsaKeymaster1Key(RSA* rsa_key, AuthorizationSet&& hw_enforced, 77 : RsaKey(rsa_key, move(hw_enforced), move(sw_enforced), key_factory) {}
|
/system/keymaster/legacy_support/ |
rsa_keymaster1_operation.cpp | 30 keymaster_error_t RsaKeymaster1WrappedOperation::Begin(EVP_PKEY* rsa_key, 32 Keymaster1Engine::KeyData* key_data = engine_->GetData(rsa_key); 76 RsaKeymaster1WrappedOperation::PrepareFinish(EVP_PKEY* rsa_key, 78 Keymaster1Engine::KeyData* key_data = engine_->GetData(rsa_key); 93 keymaster_error_t RsaKeymaster1WrappedOperation::GetError(EVP_PKEY* rsa_key) { 94 Keymaster1Engine::KeyData* key_data = engine_->GetData(rsa_key); // key_data is owned by rsa
|
rsa_keymaster1_operation.h | 39 keymaster_error_t Begin(EVP_PKEY* rsa_key, const AuthorizationSet& input_params); 40 keymaster_error_t PrepareFinish(EVP_PKEY* rsa_key, const AuthorizationSet& input_params); 43 keymaster_error_t GetError(EVP_PKEY* rsa_key);
|
/external/libchrome/crypto/ |
rsa_private_key.cc | 26 bssl::UniquePtr<RSA> rsa_key(RSA_new()); 28 if (!rsa_key.get() || !bn.get() || !BN_set_word(bn.get(), 65537L)) 31 if (!RSA_generate_key_ex(rsa_key.get(), num_bits, bn.get(), nullptr)) 36 if (!result->key_ || !EVP_PKEY_set1_RSA(result->key_.get(), rsa_key.get()))
|
/external/boringssl/src/fipstools/ |
test_fips.c | 178 RSA *rsa_key = RSA_new(); local 180 if (!RSA_generate_key_fips(rsa_key, 2048, NULL)) { 190 &sig_len, rsa_key)) { 201 output, sig_len, rsa_key)) { 206 RSA_free(rsa_key);
|
/external/vboot_reference/host/lib/ |
host_key.c | 26 RSA* rsa_key; local 40 rsa_key = PEM_read_RSAPrivateKey(f, NULL, NULL, NULL); 42 if (!rsa_key) { 51 RSA_free(rsa_key); 54 key->rsa_private_key = rsa_key;
|
/system/core/trusty/keymaster/ |
Makefile | 84 $(KM)/rsa_key.cpp \ 180 $(KM)/rsa_key.o \
|
/external/toolchain-utils/crosperf/ |
suite_runner.py | 267 rsa_key = os.path.join( 277 '{3} {4}'.format(telemetry_run_path, machine, rsa_key,
|
/external/boringssl/src/crypto/fipsmodule/self_check/ |
self_check.c | 384 RSA *rsa_key = NULL; local 489 rsa_key = self_test_rsa_key(); 490 if (rsa_key == NULL) { 500 rsa_key->flags |= RSA_FLAG_NO_BLINDING; 503 &sig_len, rsa_key) || 511 kRSASignature, sizeof(kRSASignature), rsa_key)) { 574 RSA_free(rsa_key);
|
/external/wpa_supplicant_8/src/crypto/ |
crypto_libtomcrypt.c | 409 rsa_key rsa; 413 rsa_key rsa; 550 static int crypto_rsa_encrypt_pkcs1(int block_type, rsa_key *key, int key_type,
|
/system/keymaster/ |
Makefile | 122 km_openssl/rsa_key.cpp \ 374 km_openssl/rsa_key.o \
|
/hardware/interfaces/keymaster/3.0/vts/functional/ |
keymaster_hidl_hal_test.cpp | 246 string rsa_key = hex2str( member in namespace:android::hardware::keymaster::V3_0::test::__anon48039 [all...] |
/hardware/interfaces/keymaster/4.0/vts/functional/ |
keymaster_hidl_hal_test.cpp | 133 string rsa_key = hex2str( member in namespace:android::hardware::keymaster::V4_0::test::__anon48041 [all...] |
/system/tpm/trunks/ |
tpm_utility_impl.cc | [all...] |