HomeSort by relevance Sort by last modified time
    Searched refs:RSA (Results 26 - 50 of 299) sorted by null

12 3 4 5 6 7 8 91011>>

  /system/extras/verity/
verity_verifier.cpp 30 #include <openssl/rsa.h>
34 static RSA* load_key(const char* path) {
42 RSA* key = nullptr;
59 std::unique_ptr<RSA, decltype(&RSA_free)> key(load_key(key_path), RSA_free);
  /device/linaro/bootloader/edk2/CryptoPkg/Library/BaseCryptLib/Pk/
CryptRsaBasic.c 2 RSA Asymmetric Cipher Wrapper Implementation over OpenSSL.
4 This file implements following APIs which provide basic capabilities for RSA:
24 #include <openssl/rsa.h>
28 Allocates and initializes one RSA context for subsequent use.
30 @return Pointer to the RSA context that has been initialized.
41 // Allocates & Initializes RSA Context by OpenSSL RSA_new()
47 Release the specified RSA context.
49 @param[in] RsaContext Pointer to the RSA context to be released.
59 // Free OpenSSL RSA Context
61 RSA_free ((RSA *) RsaContext);
    [all...]
  /external/ipsec-tools/src/racoon/
prsa_par.h 96 RSA *rsa; member in union:YYSTYPE
crypto_openssl.h 40 #include <openssl/rsa.h>
63 extern int eay_check_rsasign __P((vchar_t *, vchar_t *, RSA *));
64 extern vchar_t *eay_get_rsasign __P((vchar_t *, RSA *));
66 /* RSA */
67 extern vchar_t *eay_rsa_sign __P((vchar_t *, RSA *));
68 extern int eay_rsa_verify __P((vchar_t *, vchar_t *, RSA *));
220 RSA *base64_pubkey2rsa(char *in);
221 RSA *bignum_pubkey2rsa(BIGNUM *in);
prsa_tok.l 36 /* This file contains a tokeniser for FreeS/WAN-style ipsec.secrets RSA keys. */
40 #include <openssl/rsa.h>
60 RSA { return TAG_RSA; }
  /external/vboot_reference/scripts/
genpadding.sh 8 # various combinations of RSA key lengths and message digest algorithms.
45 * arrays corresponding to various combinations of algorithms for RSA signatures.
56 * PKCS 1.5 padding (from the RSA PKCS#1 v2.1 standard)
58 * Depending on the RSA key size and hash function, the padding is calculated
73 * PS: octet string consisting of {Length(RSA Key) - Length(T) - 3} 0xFF
  /libcore/benchmarks/src/benchmarks/regression/
KeyPairGeneratorBenchmark.java 29 RSA,
  /prebuilts/go/darwin-x86/src/crypto/x509/
x509_test_import.go 44 var pemPrivateKey = `-----BEGIN RSA PRIVATE KEY-----
52 -----END RSA PRIVATE KEY-----
  /prebuilts/go/darwin-x86/src/net/http/internal/
testcert.go 10 // go run generate_cert.go --rsa-bits 1024 --host 127.0.0.1,::1,example.com --ca --start-date "Jan 1 00:00:00 1970" --duration=1000000h
27 var LocalhostKey = []byte(`-----BEGIN RSA PRIVATE KEY-----
41 -----END RSA PRIVATE KEY-----`)
  /prebuilts/go/linux-x86/src/crypto/x509/
x509_test_import.go 44 var pemPrivateKey = `-----BEGIN RSA PRIVATE KEY-----
52 -----END RSA PRIVATE KEY-----
  /prebuilts/go/linux-x86/src/net/http/internal/
testcert.go 10 // go run generate_cert.go --rsa-bits 1024 --host 127.0.0.1,::1,example.com --ca --start-date "Jan 1 00:00:00 1970" --duration=1000000h
27 var LocalhostKey = []byte(`-----BEGIN RSA PRIVATE KEY-----
41 -----END RSA PRIVATE KEY-----`)
  /system/core/libcrypto_utils/
android_pubkey.c 27 #error RSA modulus size must be multiple of the word size!
30 // Size of the RSA modulus in words.
33 // This file implements encoding and decoding logic for Android's custom RSA
45 // RSA modulus as a little-endian array.
51 // RSA modulus: 3 or 65537
64 bool android_pubkey_decode(const uint8_t* key_buffer, size_t size, RSA** key) {
68 RSA* new_key = RSA_new();
122 bool android_pubkey_encode(const RSA* key, uint8_t* key_buffer, size_t size) {
  /tools/apkzlib/src/main/java/com/android/tools/build/apkzlib/sign/
SignatureAlgorithm.java 26 /** RSA algorithm. */
27 RSA("RSA", 1, "withRSA"),
  /system/core/adb/
adb_auth_host.cpp 41 #include <openssl/rsa.h>
51 static std::map<std::string, std::shared_ptr<RSA>>& g_keys =
52 *new std::map<std::string, std::shared_ptr<RSA>>;
76 static bool write_public_keyfile(RSA* private_key, const std::string& private_key_path) {
117 RSA* rsa = RSA_new(); local
118 if (!pkey || !exponent || !rsa) {
124 RSA_generate_key_ex(rsa, 2048, exponent, NULL);
125 EVP_PKEY_set1_RSA(pkey, rsa);
143 if (!write_public_keyfile(rsa, file))
    [all...]
  /prebuilts/jdk/jdk9/darwin-x86/legal/jdk.crypto.cryptoki/
pkcs11cryptotoken.md 7 identified as "RSA Security Inc. PKCS #11 Cryptographic Token Interface
11 such works are identified as "derived from the RSA Security Inc. PKCS #11
15 RSA Security Inc. makes no representations concerning either the
  /prebuilts/jdk/jdk9/linux-x86/legal/jdk.crypto.cryptoki/
pkcs11cryptotoken.md 7 identified as "RSA Security Inc. PKCS #11 Cryptographic Token Interface
11 such works are identified as "derived from the RSA Security Inc. PKCS #11
15 RSA Security Inc. makes no representations concerning either the
  /prebuilts/jdk/jdk9/darwin-x86/conf/security/
java.security 516 # "RSA keySize <= 1024" indicates that any RSA key with key size less
518 # "RSA keySize < 1024, RSA keySize > 2048" indicates that any RSA key
542 # Example: To deny usage of RSA 2048 bit certificates after Feb 3 2020,
543 # use the following: "RSA keySize == 2048 & denyAfter 2020-02-03"
561 # RSA keys that are less than or equal to 1024 bits, add the following
562 # constraint: "RSA keySize <= 1024 & jdkCA".
567 # "RSA keySize < 1024 & jdkCA, RSA keySize < 2048"
    [all...]
  /prebuilts/jdk/jdk9/linux-x86/conf/security/
java.security 515 # "RSA keySize <= 1024" indicates that any RSA key with key size less
517 # "RSA keySize < 1024, RSA keySize > 2048" indicates that any RSA key
541 # Example: To deny usage of RSA 2048 bit certificates after Feb 3 2020,
542 # use the following: "RSA keySize == 2048 & denyAfter 2020-02-03"
560 # RSA keys that are less than or equal to 1024 bits, add the following
561 # constraint: "RSA keySize <= 1024 & jdkCA".
566 # "RSA keySize < 1024 & jdkCA, RSA keySize < 2048"
    [all...]
  /prebuilts/go/darwin-x86/src/crypto/rsa/
example_test.go 5 package rsa package
19 // RSA is able to encrypt only a very limited amount of data. In order
21 // used: RSA is used to encrypt a key for a symmetric primitive like
31 // avoid disclosing whether the received RSA message was well-formed
36 // a buffer that contains a random key. Thus, if the RSA result isn't
39 // crypto/rand.Reader is a good source of entropy for blinding the RSA
44 // we read the random key that will be used if the RSA decryption isn't
56 // instance, if the length of key is impossible given the RSA
58 fmt.Fprintf(os.Stderr, "Error from RSA decryption: %s\n", err)
79 // The RSA ciphertext was badly formed; the decryption wil
    [all...]
  /prebuilts/go/linux-x86/src/crypto/rsa/
example_test.go 5 package rsa package
19 // RSA is able to encrypt only a very limited amount of data. In order
21 // used: RSA is used to encrypt a key for a symmetric primitive like
31 // avoid disclosing whether the received RSA message was well-formed
36 // a buffer that contains a random key. Thus, if the RSA result isn't
39 // crypto/rand.Reader is a good source of entropy for blinding the RSA
44 // we read the random key that will be used if the RSA decryption isn't
56 // instance, if the length of key is impossible given the RSA
58 fmt.Fprintf(os.Stderr, "Error from RSA decryption: %s\n", err)
79 // The RSA ciphertext was badly formed; the decryption wil
    [all...]
  /external/boringssl/src/crypto/evp/
evp.c 10 * apply to all code found in this distribution, be it the RC4, RSA,
67 #include <openssl/rsa.h>
216 int EVP_PKEY_set1_RSA(EVP_PKEY *pkey, RSA *key) {
224 int EVP_PKEY_assign_RSA(EVP_PKEY *pkey, RSA *key) {
228 RSA *EVP_PKEY_get0_RSA(EVP_PKEY *pkey) {
233 return pkey->pkey.rsa;
236 RSA *EVP_PKEY_get1_RSA(EVP_PKEY *pkey) {
237 RSA *rsa = EVP_PKEY_get0_RSA(pkey); local
238 if (rsa != NULL)
    [all...]
  /external/boringssl/src/crypto/x509/
x_pubkey.c 10 * apply to all code found in this distribution, be it the RC4, RSA,
220 * The following are equivalents but which return RSA and DSA keys
222 RSA *d2i_RSA_PUBKEY(RSA **a, const unsigned char **pp, long length)
225 RSA *key;
243 int i2d_RSA_PUBKEY(const RSA *a, unsigned char **pp)
254 EVP_PKEY_set1_RSA(pktmp, (RSA *)a);
  /external/vboot_reference/utility/
dumpRSAPublicKey.c 7 * support for additional RSA key sizes. (platform/system/core,git/libmincrypt
17 /* Command line tool to extract RSA public keys from X.509 certificates
18 * and output a pre-processed version of keys for use by RSA verification
22 int check(RSA* key) {
39 /* Pre-processes and outputs RSA public key to standard out.
41 void output(RSA* key) {
52 /* Output size of RSA key in 32-bit words */
140 RSA* pubkey = NULL;
176 fprintf(stderr, "Couldn't convert to a RSA style key.\n");
  /system/security/keystore-engine/
android_engine.cpp 39 #include <openssl/rsa.h>
54 /* key_id_dup is called when one of the RSA or EC_KEY objects is duplicated. */
68 /* key_id_free is called when one of the RSA, DSA or EC_KEY object is freed. */
86 const char* rsa_get_key_id(const RSA* rsa);
89 * d'th power of it, modulo the RSA modulus, and writes the result as a
92 int rsa_private_transform(RSA *rsa, uint8_t *out, const uint8_t *in, size_t len) {
93 ALOGV("rsa_private_transform(%p, %p, %p, %u)", rsa, out, in, (unsigned) len);
97 const char *key_id = rsa_get_key_id(rsa);
    [all...]
  /external/google-tv-pairing-protocol/cpp/src/polo/pairing/
polochallengeresponse.cc 38 RSA* client_pub_rsa = EVP_PKEY_get1_RSA(client_pkey);
48 RSA* server_pub_rsa = EVP_PKEY_get1_RSA(server_pkey);

Completed in 831 milliseconds

12 3 4 5 6 7 8 91011>>