/system/extras/verity/ |
verity_verifier.cpp | 30 #include <openssl/rsa.h> 34 static RSA* load_key(const char* path) { 42 RSA* key = nullptr; 59 std::unique_ptr<RSA, decltype(&RSA_free)> key(load_key(key_path), RSA_free);
|
/device/linaro/bootloader/edk2/CryptoPkg/Library/BaseCryptLib/Pk/ |
CryptRsaBasic.c | 2 RSA Asymmetric Cipher Wrapper Implementation over OpenSSL.
4 This file implements following APIs which provide basic capabilities for RSA:
24 #include <openssl/rsa.h>
28 Allocates and initializes one RSA context for subsequent use.
30 @return Pointer to the RSA context that has been initialized.
41 // Allocates & Initializes RSA Context by OpenSSL RSA_new()
47 Release the specified RSA context.
49 @param[in] RsaContext Pointer to the RSA context to be released.
59 // Free OpenSSL RSA Context
61 RSA_free ((RSA *) RsaContext); [all...] |
/external/ipsec-tools/src/racoon/ |
prsa_par.h | 96 RSA *rsa; member in union:YYSTYPE
|
crypto_openssl.h | 40 #include <openssl/rsa.h> 63 extern int eay_check_rsasign __P((vchar_t *, vchar_t *, RSA *)); 64 extern vchar_t *eay_get_rsasign __P((vchar_t *, RSA *)); 66 /* RSA */ 67 extern vchar_t *eay_rsa_sign __P((vchar_t *, RSA *)); 68 extern int eay_rsa_verify __P((vchar_t *, vchar_t *, RSA *)); 220 RSA *base64_pubkey2rsa(char *in); 221 RSA *bignum_pubkey2rsa(BIGNUM *in);
|
prsa_tok.l | 36 /* This file contains a tokeniser for FreeS/WAN-style ipsec.secrets RSA keys. */ 40 #include <openssl/rsa.h> 60 RSA { return TAG_RSA; }
|
/external/vboot_reference/scripts/ |
genpadding.sh | 8 # various combinations of RSA key lengths and message digest algorithms. 45 * arrays corresponding to various combinations of algorithms for RSA signatures. 56 * PKCS 1.5 padding (from the RSA PKCS#1 v2.1 standard) 58 * Depending on the RSA key size and hash function, the padding is calculated 73 * PS: octet string consisting of {Length(RSA Key) - Length(T) - 3} 0xFF
|
/libcore/benchmarks/src/benchmarks/regression/ |
KeyPairGeneratorBenchmark.java | 29 RSA,
|
/prebuilts/go/darwin-x86/src/crypto/x509/ |
x509_test_import.go | 44 var pemPrivateKey = `-----BEGIN RSA PRIVATE KEY----- 52 -----END RSA PRIVATE KEY-----
|
/prebuilts/go/darwin-x86/src/net/http/internal/ |
testcert.go | 10 // go run generate_cert.go --rsa-bits 1024 --host 127.0.0.1,::1,example.com --ca --start-date "Jan 1 00:00:00 1970" --duration=1000000h 27 var LocalhostKey = []byte(`-----BEGIN RSA PRIVATE KEY----- 41 -----END RSA PRIVATE KEY-----`)
|
/prebuilts/go/linux-x86/src/crypto/x509/ |
x509_test_import.go | 44 var pemPrivateKey = `-----BEGIN RSA PRIVATE KEY----- 52 -----END RSA PRIVATE KEY-----
|
/prebuilts/go/linux-x86/src/net/http/internal/ |
testcert.go | 10 // go run generate_cert.go --rsa-bits 1024 --host 127.0.0.1,::1,example.com --ca --start-date "Jan 1 00:00:00 1970" --duration=1000000h 27 var LocalhostKey = []byte(`-----BEGIN RSA PRIVATE KEY----- 41 -----END RSA PRIVATE KEY-----`)
|
/system/core/libcrypto_utils/ |
android_pubkey.c | 27 #error RSA modulus size must be multiple of the word size! 30 // Size of the RSA modulus in words. 33 // This file implements encoding and decoding logic for Android's custom RSA 45 // RSA modulus as a little-endian array. 51 // RSA modulus: 3 or 65537 64 bool android_pubkey_decode(const uint8_t* key_buffer, size_t size, RSA** key) { 68 RSA* new_key = RSA_new(); 122 bool android_pubkey_encode(const RSA* key, uint8_t* key_buffer, size_t size) {
|
/tools/apkzlib/src/main/java/com/android/tools/build/apkzlib/sign/ |
SignatureAlgorithm.java | 26 /** RSA algorithm. */ 27 RSA("RSA", 1, "withRSA"),
|
/system/core/adb/ |
adb_auth_host.cpp | 41 #include <openssl/rsa.h> 51 static std::map<std::string, std::shared_ptr<RSA>>& g_keys = 52 *new std::map<std::string, std::shared_ptr<RSA>>; 76 static bool write_public_keyfile(RSA* private_key, const std::string& private_key_path) { 117 RSA* rsa = RSA_new(); local 118 if (!pkey || !exponent || !rsa) { 124 RSA_generate_key_ex(rsa, 2048, exponent, NULL); 125 EVP_PKEY_set1_RSA(pkey, rsa); 143 if (!write_public_keyfile(rsa, file)) [all...] |
/prebuilts/jdk/jdk9/darwin-x86/legal/jdk.crypto.cryptoki/ |
pkcs11cryptotoken.md | 7 identified as "RSA Security Inc. PKCS #11 Cryptographic Token Interface 11 such works are identified as "derived from the RSA Security Inc. PKCS #11 15 RSA Security Inc. makes no representations concerning either the
|
/prebuilts/jdk/jdk9/linux-x86/legal/jdk.crypto.cryptoki/ |
pkcs11cryptotoken.md | 7 identified as "RSA Security Inc. PKCS #11 Cryptographic Token Interface 11 such works are identified as "derived from the RSA Security Inc. PKCS #11 15 RSA Security Inc. makes no representations concerning either the
|
/prebuilts/jdk/jdk9/darwin-x86/conf/security/ |
java.security | 516 # "RSA keySize <= 1024" indicates that any RSA key with key size less 518 # "RSA keySize < 1024, RSA keySize > 2048" indicates that any RSA key 542 # Example: To deny usage of RSA 2048 bit certificates after Feb 3 2020, 543 # use the following: "RSA keySize == 2048 & denyAfter 2020-02-03" 561 # RSA keys that are less than or equal to 1024 bits, add the following 562 # constraint: "RSA keySize <= 1024 & jdkCA". 567 # "RSA keySize < 1024 & jdkCA, RSA keySize < 2048" [all...] |
/prebuilts/jdk/jdk9/linux-x86/conf/security/ |
java.security | 515 # "RSA keySize <= 1024" indicates that any RSA key with key size less 517 # "RSA keySize < 1024, RSA keySize > 2048" indicates that any RSA key 541 # Example: To deny usage of RSA 2048 bit certificates after Feb 3 2020, 542 # use the following: "RSA keySize == 2048 & denyAfter 2020-02-03" 560 # RSA keys that are less than or equal to 1024 bits, add the following 561 # constraint: "RSA keySize <= 1024 & jdkCA". 566 # "RSA keySize < 1024 & jdkCA, RSA keySize < 2048" [all...] |
/prebuilts/go/darwin-x86/src/crypto/rsa/ |
example_test.go | 5 package rsa package 19 // RSA is able to encrypt only a very limited amount of data. In order 21 // used: RSA is used to encrypt a key for a symmetric primitive like 31 // avoid disclosing whether the received RSA message was well-formed 36 // a buffer that contains a random key. Thus, if the RSA result isn't 39 // crypto/rand.Reader is a good source of entropy for blinding the RSA 44 // we read the random key that will be used if the RSA decryption isn't 56 // instance, if the length of key is impossible given the RSA 58 fmt.Fprintf(os.Stderr, "Error from RSA decryption: %s\n", err) 79 // The RSA ciphertext was badly formed; the decryption wil [all...] |
/prebuilts/go/linux-x86/src/crypto/rsa/ |
example_test.go | 5 package rsa package 19 // RSA is able to encrypt only a very limited amount of data. In order 21 // used: RSA is used to encrypt a key for a symmetric primitive like 31 // avoid disclosing whether the received RSA message was well-formed 36 // a buffer that contains a random key. Thus, if the RSA result isn't 39 // crypto/rand.Reader is a good source of entropy for blinding the RSA 44 // we read the random key that will be used if the RSA decryption isn't 56 // instance, if the length of key is impossible given the RSA 58 fmt.Fprintf(os.Stderr, "Error from RSA decryption: %s\n", err) 79 // The RSA ciphertext was badly formed; the decryption wil [all...] |
/external/boringssl/src/crypto/evp/ |
evp.c | 10 * apply to all code found in this distribution, be it the RC4, RSA, 67 #include <openssl/rsa.h> 216 int EVP_PKEY_set1_RSA(EVP_PKEY *pkey, RSA *key) { 224 int EVP_PKEY_assign_RSA(EVP_PKEY *pkey, RSA *key) { 228 RSA *EVP_PKEY_get0_RSA(EVP_PKEY *pkey) { 233 return pkey->pkey.rsa; 236 RSA *EVP_PKEY_get1_RSA(EVP_PKEY *pkey) { 237 RSA *rsa = EVP_PKEY_get0_RSA(pkey); local 238 if (rsa != NULL) [all...] |
/external/boringssl/src/crypto/x509/ |
x_pubkey.c | 10 * apply to all code found in this distribution, be it the RC4, RSA, 220 * The following are equivalents but which return RSA and DSA keys 222 RSA *d2i_RSA_PUBKEY(RSA **a, const unsigned char **pp, long length) 225 RSA *key; 243 int i2d_RSA_PUBKEY(const RSA *a, unsigned char **pp) 254 EVP_PKEY_set1_RSA(pktmp, (RSA *)a);
|
/external/vboot_reference/utility/ |
dumpRSAPublicKey.c | 7 * support for additional RSA key sizes. (platform/system/core,git/libmincrypt 17 /* Command line tool to extract RSA public keys from X.509 certificates 18 * and output a pre-processed version of keys for use by RSA verification 22 int check(RSA* key) { 39 /* Pre-processes and outputs RSA public key to standard out. 41 void output(RSA* key) { 52 /* Output size of RSA key in 32-bit words */ 140 RSA* pubkey = NULL; 176 fprintf(stderr, "Couldn't convert to a RSA style key.\n");
|
/system/security/keystore-engine/ |
android_engine.cpp | 39 #include <openssl/rsa.h> 54 /* key_id_dup is called when one of the RSA or EC_KEY objects is duplicated. */ 68 /* key_id_free is called when one of the RSA, DSA or EC_KEY object is freed. */ 86 const char* rsa_get_key_id(const RSA* rsa); 89 * d'th power of it, modulo the RSA modulus, and writes the result as a 92 int rsa_private_transform(RSA *rsa, uint8_t *out, const uint8_t *in, size_t len) { 93 ALOGV("rsa_private_transform(%p, %p, %p, %u)", rsa, out, in, (unsigned) len); 97 const char *key_id = rsa_get_key_id(rsa); [all...] |
/external/google-tv-pairing-protocol/cpp/src/polo/pairing/ |
polochallengeresponse.cc | 38 RSA* client_pub_rsa = EVP_PKEY_get1_RSA(client_pkey); 48 RSA* server_pub_rsa = EVP_PKEY_get1_RSA(server_pkey);
|