/system/core/adb/ |
transport.h | 31 #include <openssl/rsa.h> 149 std::shared_ptr<RSA> NextKey(); 204 std::deque<std::shared_ptr<RSA>> keys_;
|
/external/boringssl/src/crypto/pem/ |
pem_info.c | 11 * apply to all code found in this distribution, be it the RC4, RSA, 71 #include <openssl/rsa.h> 241 } else { /* encrypted RSA data */ 358 xi->x_pkey->dec_pkey->pkey.rsa,
|
/external/boringssl/src/ssl/test/runner/ |
tls.go | 12 "crypto/rsa" 233 case *rsa.PublicKey: 234 priv, ok := cert.PrivateKey.(*rsa.PrivateKey) 302 case *rsa.PrivateKey, *ecdsa.PrivateKey:
|
key_agreement.go | 10 "crypto/rsa" 37 exportKey *rsa.PrivateKey 48 // Generate an ephemeral RSA key to use instead of the real 50 key, err := rsa.GenerateKey(config.rand(), 512) 74 return nil, errors.New("failed to sign RSA parameters: " + err.Error()) 117 key := cert.PrivateKey.(*rsa.PrivateKey) 121 err = rsa.DecryptPKCS1v15SessionKey(config.rand(), key, ciphertext, preMasterSecret) 130 return nil, fmt.Errorf("tls: invalid version in RSA premaster (got %04x, wanted %04x)", vers, ka.clientVersion) 139 func rsaSize(pub *rsa.PublicKey) int { 143 func rsaRawEncrypt(pub *rsa.PublicKey, msg []byte) ([]byte, error) [all...] |
/prebuilts/go/darwin-x86/src/crypto/rsa/ |
pss.go | 5 package rsa package 9 // [1] https://www.emc.com/collateral/white-papers/h11300-pkcs-1v2-2-rsa-cryptography-standard-wp.pdf 33 return nil, errors.New("crypto/rsa: input must be hashed message") 39 return nil, errors.New("crypto/rsa: encoding error")
|
/prebuilts/go/darwin-x86/src/crypto/tls/ |
tls.go | 16 "crypto/rsa" 254 case *rsa.PublicKey: 255 priv, ok := cert.PrivateKey.(*rsa.PrivateKey) 286 case *rsa.PrivateKey, *ecdsa.PrivateKey:
|
handshake_server.go | 10 "crypto/rsa" 229 case *rsa.PublicKey: 238 case *rsa.PublicKey: 538 case *rsa.PublicKey: 564 case *rsa.PublicKey: 566 err = errors.New("tls: bad signature type for client's RSA certificate") 574 err = rsa.VerifyPKCS1v15(key, hashFunc, digest, certVerify.signature) 756 case *ecdsa.PublicKey, *rsa.PublicKey:
|
/prebuilts/go/darwin-x86/src/syscall/ |
syscall_dragonfly.go | 96 var rsa RawSockaddrAny 98 nfd, err = accept4(fd, &rsa, &len, flags) 105 sa, err = anyToSockaddr(&rsa) 217 //sys accept4(fd int, rsa *RawSockaddrAny, addrlen *_Socklen, flags int) (nfd int, err error)
|
syscall_windows.go | 578 //sys getsockname(s Handle, rsa *RawSockaddrAny, addrlen *int32) (err error) [failretval==socket_error] = ws2_32.getsockname 579 //sys getpeername(s Handle, rsa *RawSockaddrAny, addrlen *int32) (err error) [failretval==socket_error] = ws2_32.getpeername 687 func (rsa *RawSockaddrAny) Sockaddr() (Sockaddr, error) { 688 switch rsa.Addr.Family { 693 pp := (*RawSockaddrInet4)(unsafe.Pointer(rsa)) 703 pp := (*RawSockaddrInet6)(unsafe.Pointer(rsa)) 745 var rsa RawSockaddrAny 746 l := int32(unsafe.Sizeof(rsa)) 747 if err = getsockname(fd, &rsa, &l); err != nil { 750 return rsa.Sockaddr( [all...] |
syscall_freebsd.go | 98 var rsa RawSockaddrAny 100 nfd, err = accept4(fd, &rsa, &len, flags) 107 sa, err = anyToSockaddr(&rsa) 221 //sys accept4(fd int, rsa *RawSockaddrAny, addrlen *_Socklen, flags int) (nfd int, err error)
|
/prebuilts/go/linux-x86/src/crypto/rsa/ |
pss.go | 5 package rsa package 9 // [1] https://www.emc.com/collateral/white-papers/h11300-pkcs-1v2-2-rsa-cryptography-standard-wp.pdf 33 return nil, errors.New("crypto/rsa: input must be hashed message") 39 return nil, errors.New("crypto/rsa: encoding error")
|
/prebuilts/go/linux-x86/src/crypto/tls/ |
tls.go | 16 "crypto/rsa" 254 case *rsa.PublicKey: 255 priv, ok := cert.PrivateKey.(*rsa.PrivateKey) 286 case *rsa.PrivateKey, *ecdsa.PrivateKey:
|
handshake_server.go | 10 "crypto/rsa" 229 case *rsa.PublicKey: 238 case *rsa.PublicKey: 538 case *rsa.PublicKey: 564 case *rsa.PublicKey: 566 err = errors.New("tls: bad signature type for client's RSA certificate") 574 err = rsa.VerifyPKCS1v15(key, hashFunc, digest, certVerify.signature) 756 case *ecdsa.PublicKey, *rsa.PublicKey:
|
/prebuilts/go/linux-x86/src/syscall/ |
syscall_dragonfly.go | 96 var rsa RawSockaddrAny 98 nfd, err = accept4(fd, &rsa, &len, flags) 105 sa, err = anyToSockaddr(&rsa) 217 //sys accept4(fd int, rsa *RawSockaddrAny, addrlen *_Socklen, flags int) (nfd int, err error)
|
syscall_windows.go | 578 //sys getsockname(s Handle, rsa *RawSockaddrAny, addrlen *int32) (err error) [failretval==socket_error] = ws2_32.getsockname 579 //sys getpeername(s Handle, rsa *RawSockaddrAny, addrlen *int32) (err error) [failretval==socket_error] = ws2_32.getpeername 687 func (rsa *RawSockaddrAny) Sockaddr() (Sockaddr, error) { 688 switch rsa.Addr.Family { 693 pp := (*RawSockaddrInet4)(unsafe.Pointer(rsa)) 703 pp := (*RawSockaddrInet6)(unsafe.Pointer(rsa)) 745 var rsa RawSockaddrAny 746 l := int32(unsafe.Sizeof(rsa)) 747 if err = getsockname(fd, &rsa, &l); err != nil { 750 return rsa.Sockaddr( [all...] |
syscall_freebsd.go | 98 var rsa RawSockaddrAny 100 nfd, err = accept4(fd, &rsa, &len, flags) 107 sa, err = anyToSockaddr(&rsa) 221 //sys accept4(fd int, rsa *RawSockaddrAny, addrlen *_Socklen, flags int) (nfd int, err error)
|
/prebuilts/go/darwin-x86/src/internal/poll/ |
fd_windows.go | 98 rsa *syscall.RawSockaddrAny 618 if o.rsa == nil { 619 o.rsa = new(syscall.RawSockaddrAny) 621 o.rsan = int32(unsafe.Sizeof(*o.rsa)) 622 return syscall.WSARecvFrom(o.fd.Sysfd, &o.buf, 1, &o.qty, &o.flags, o.rsa, &o.rsan, &o.o, nil) 628 sa, _ := o.rsa.Sockaddr() 957 o.rsa = new(syscall.RawSockaddrAny) 958 o.msg.Name = o.rsa 959 o.msg.Namelen = int32(unsafe.Sizeof(*o.rsa)) 966 sa, err = o.rsa.Sockaddr( [all...] |
/prebuilts/go/linux-x86/src/internal/poll/ |
fd_windows.go | 98 rsa *syscall.RawSockaddrAny 618 if o.rsa == nil { 619 o.rsa = new(syscall.RawSockaddrAny) 621 o.rsan = int32(unsafe.Sizeof(*o.rsa)) 622 return syscall.WSARecvFrom(o.fd.Sysfd, &o.buf, 1, &o.qty, &o.flags, o.rsa, &o.rsan, &o.o, nil) 628 sa, _ := o.rsa.Sockaddr() 957 o.rsa = new(syscall.RawSockaddrAny) 958 o.msg.Name = o.rsa 959 o.msg.Namelen = int32(unsafe.Sizeof(*o.rsa)) 966 sa, err = o.rsa.Sockaddr( [all...] |
/external/ipsec-tools/src/racoon/ |
crypto_openssl.c | 979 res = eay_rsa_verify(source, sig, evp->pkey.rsa); 988 * check RSA signature 993 eay_check_rsasign(source, sig, rsa) 996 RSA *rsa; 998 return eay_rsa_verify(source, sig, rsa); 1134 sig = eay_rsa_sign(src, evp->pkey.rsa); 1142 eay_get_rsasign(src, rsa) 1144 RSA *rsa; [all...] |
/external/curl/lib/vtls/ |
openssl.c | 66 #include <openssl/rsa.h> 833 /* If RSA is used, don't check the private key if its flags indicate 843 RSA *rsa = EVP_PKEY_get1_RSA(priv_key); local 844 if(RSA_flags(rsa) & RSA_METHOD_FLAG_NO_CHECK) 846 RSA_free(rsa); /* Decrement reference count */ 2849 RSA *rsa; local [all...] |
/device/google/contexthub/firmware/os/core/ |
appSec.c | 23 #include <nanohub/rsa.h> 62 struct RsaState rsa; member in struct:AppSecState::__anon1714::__anon1716 387 result = BL.blRsaPubOpIterative(&state->rsa, state->rsaTmp, state->dataWords, &state->rsaState1, &state->rsaState2, &state->rsaStep); 391 //we just finished the RSA-ing
|
bl.c | 26 #include <nanohub/rsa.h> 334 struct RsaState rsa; local 377 rsaResult = rsaPubOpIterative(&rsa, osSigHash, osSigPubkey, &rsaStateVar1, &rsaStateVar2, &rsaStep);
|
/external/scapy/scapy/layers/tls/ |
cert.py | 9 Supports both RSA and ECDSA objects. 39 from cryptography.hazmat.primitives.asymmetric import rsa 194 # This deals with the rare RSA 'kx export' call. 227 marker = b"RSA PUBLIC KEY" 254 Wrapper for RSA keys based on _EncryptAndVerifyRSA from crypto/pkcs1.py 262 private_key = rsa.generate_private_key(public_exponent=pubExp, 270 pubNum = rsa.RSAPublicNumbers(n=modulus, e=pubExp) 378 marker = b"RSA PRIVATE KEY" 411 indicate ecdsa-with-SHA512) and the result (e.g. RSA signing MD2). 416 subclasses accept any argument, be it from the RSA or ECDSA world [all...] |
/external/vboot_reference/host/lib21/ |
host_key.c | 14 #include "2rsa.h" 133 /* Unpack RSA key */ 252 /* Pack RSA key */ 545 enum vb2_signature_algorithm vb2_rsa_sig_alg(struct rsa_st *rsa) 547 int bits = BN_num_bits(rsa->n);
|
/system/tpm/trunks/ |
tpm_utility_test.cc | 477 public_area.public_area.unique.rsa.size = 0; 499 public_area.public_area.unique.rsa.size = 0; 536 public_area.public_area.unique.rsa.size = 0; 562 public_area.public_area.unique.rsa.size = 0; 588 public_area.public_area.unique.rsa.size = 0; 612 public_area.public_area.unique.rsa.size = 0; 663 public_area.public_area.unique.rsa.size = 0; 691 public_area.public_area.unique.rsa.size = 0; 719 public_area.public_area.unique.rsa.size = 0; 741 public_area.public_area.unique.rsa.size = 0 [all...] |