HomeSort by relevance Sort by last modified time
    Searched refs:rsa (Results 201 - 225 of 390) sorted by null

1 2 3 4 5 6 7 891011>>

  /system/core/adb/
transport.h 31 #include <openssl/rsa.h>
149 std::shared_ptr<RSA> NextKey();
204 std::deque<std::shared_ptr<RSA>> keys_;
  /external/boringssl/src/crypto/pem/
pem_info.c 11 * apply to all code found in this distribution, be it the RC4, RSA,
71 #include <openssl/rsa.h>
241 } else { /* encrypted RSA data */
358 xi->x_pkey->dec_pkey->pkey.rsa,
  /external/boringssl/src/ssl/test/runner/
tls.go 12 "crypto/rsa"
233 case *rsa.PublicKey:
234 priv, ok := cert.PrivateKey.(*rsa.PrivateKey)
302 case *rsa.PrivateKey, *ecdsa.PrivateKey:
key_agreement.go 10 "crypto/rsa"
37 exportKey *rsa.PrivateKey
48 // Generate an ephemeral RSA key to use instead of the real
50 key, err := rsa.GenerateKey(config.rand(), 512)
74 return nil, errors.New("failed to sign RSA parameters: " + err.Error())
117 key := cert.PrivateKey.(*rsa.PrivateKey)
121 err = rsa.DecryptPKCS1v15SessionKey(config.rand(), key, ciphertext, preMasterSecret)
130 return nil, fmt.Errorf("tls: invalid version in RSA premaster (got %04x, wanted %04x)", vers, ka.clientVersion)
139 func rsaSize(pub *rsa.PublicKey) int {
143 func rsaRawEncrypt(pub *rsa.PublicKey, msg []byte) ([]byte, error)
    [all...]
  /prebuilts/go/darwin-x86/src/crypto/rsa/
pss.go 5 package rsa package
9 // [1] https://www.emc.com/collateral/white-papers/h11300-pkcs-1v2-2-rsa-cryptography-standard-wp.pdf
33 return nil, errors.New("crypto/rsa: input must be hashed message")
39 return nil, errors.New("crypto/rsa: encoding error")
  /prebuilts/go/darwin-x86/src/crypto/tls/
tls.go 16 "crypto/rsa"
254 case *rsa.PublicKey:
255 priv, ok := cert.PrivateKey.(*rsa.PrivateKey)
286 case *rsa.PrivateKey, *ecdsa.PrivateKey:
handshake_server.go 10 "crypto/rsa"
229 case *rsa.PublicKey:
238 case *rsa.PublicKey:
538 case *rsa.PublicKey:
564 case *rsa.PublicKey:
566 err = errors.New("tls: bad signature type for client's RSA certificate")
574 err = rsa.VerifyPKCS1v15(key, hashFunc, digest, certVerify.signature)
756 case *ecdsa.PublicKey, *rsa.PublicKey:
  /prebuilts/go/darwin-x86/src/syscall/
syscall_dragonfly.go 96 var rsa RawSockaddrAny
98 nfd, err = accept4(fd, &rsa, &len, flags)
105 sa, err = anyToSockaddr(&rsa)
217 //sys accept4(fd int, rsa *RawSockaddrAny, addrlen *_Socklen, flags int) (nfd int, err error)
syscall_windows.go 578 //sys getsockname(s Handle, rsa *RawSockaddrAny, addrlen *int32) (err error) [failretval==socket_error] = ws2_32.getsockname
579 //sys getpeername(s Handle, rsa *RawSockaddrAny, addrlen *int32) (err error) [failretval==socket_error] = ws2_32.getpeername
687 func (rsa *RawSockaddrAny) Sockaddr() (Sockaddr, error) {
688 switch rsa.Addr.Family {
693 pp := (*RawSockaddrInet4)(unsafe.Pointer(rsa))
703 pp := (*RawSockaddrInet6)(unsafe.Pointer(rsa))
745 var rsa RawSockaddrAny
746 l := int32(unsafe.Sizeof(rsa))
747 if err = getsockname(fd, &rsa, &l); err != nil {
750 return rsa.Sockaddr(
    [all...]
syscall_freebsd.go 98 var rsa RawSockaddrAny
100 nfd, err = accept4(fd, &rsa, &len, flags)
107 sa, err = anyToSockaddr(&rsa)
221 //sys accept4(fd int, rsa *RawSockaddrAny, addrlen *_Socklen, flags int) (nfd int, err error)
  /prebuilts/go/linux-x86/src/crypto/rsa/
pss.go 5 package rsa package
9 // [1] https://www.emc.com/collateral/white-papers/h11300-pkcs-1v2-2-rsa-cryptography-standard-wp.pdf
33 return nil, errors.New("crypto/rsa: input must be hashed message")
39 return nil, errors.New("crypto/rsa: encoding error")
  /prebuilts/go/linux-x86/src/crypto/tls/
tls.go 16 "crypto/rsa"
254 case *rsa.PublicKey:
255 priv, ok := cert.PrivateKey.(*rsa.PrivateKey)
286 case *rsa.PrivateKey, *ecdsa.PrivateKey:
handshake_server.go 10 "crypto/rsa"
229 case *rsa.PublicKey:
238 case *rsa.PublicKey:
538 case *rsa.PublicKey:
564 case *rsa.PublicKey:
566 err = errors.New("tls: bad signature type for client's RSA certificate")
574 err = rsa.VerifyPKCS1v15(key, hashFunc, digest, certVerify.signature)
756 case *ecdsa.PublicKey, *rsa.PublicKey:
  /prebuilts/go/linux-x86/src/syscall/
syscall_dragonfly.go 96 var rsa RawSockaddrAny
98 nfd, err = accept4(fd, &rsa, &len, flags)
105 sa, err = anyToSockaddr(&rsa)
217 //sys accept4(fd int, rsa *RawSockaddrAny, addrlen *_Socklen, flags int) (nfd int, err error)
syscall_windows.go 578 //sys getsockname(s Handle, rsa *RawSockaddrAny, addrlen *int32) (err error) [failretval==socket_error] = ws2_32.getsockname
579 //sys getpeername(s Handle, rsa *RawSockaddrAny, addrlen *int32) (err error) [failretval==socket_error] = ws2_32.getpeername
687 func (rsa *RawSockaddrAny) Sockaddr() (Sockaddr, error) {
688 switch rsa.Addr.Family {
693 pp := (*RawSockaddrInet4)(unsafe.Pointer(rsa))
703 pp := (*RawSockaddrInet6)(unsafe.Pointer(rsa))
745 var rsa RawSockaddrAny
746 l := int32(unsafe.Sizeof(rsa))
747 if err = getsockname(fd, &rsa, &l); err != nil {
750 return rsa.Sockaddr(
    [all...]
syscall_freebsd.go 98 var rsa RawSockaddrAny
100 nfd, err = accept4(fd, &rsa, &len, flags)
107 sa, err = anyToSockaddr(&rsa)
221 //sys accept4(fd int, rsa *RawSockaddrAny, addrlen *_Socklen, flags int) (nfd int, err error)
  /prebuilts/go/darwin-x86/src/internal/poll/
fd_windows.go 98 rsa *syscall.RawSockaddrAny
618 if o.rsa == nil {
619 o.rsa = new(syscall.RawSockaddrAny)
621 o.rsan = int32(unsafe.Sizeof(*o.rsa))
622 return syscall.WSARecvFrom(o.fd.Sysfd, &o.buf, 1, &o.qty, &o.flags, o.rsa, &o.rsan, &o.o, nil)
628 sa, _ := o.rsa.Sockaddr()
957 o.rsa = new(syscall.RawSockaddrAny)
958 o.msg.Name = o.rsa
959 o.msg.Namelen = int32(unsafe.Sizeof(*o.rsa))
966 sa, err = o.rsa.Sockaddr(
    [all...]
  /prebuilts/go/linux-x86/src/internal/poll/
fd_windows.go 98 rsa *syscall.RawSockaddrAny
618 if o.rsa == nil {
619 o.rsa = new(syscall.RawSockaddrAny)
621 o.rsan = int32(unsafe.Sizeof(*o.rsa))
622 return syscall.WSARecvFrom(o.fd.Sysfd, &o.buf, 1, &o.qty, &o.flags, o.rsa, &o.rsan, &o.o, nil)
628 sa, _ := o.rsa.Sockaddr()
957 o.rsa = new(syscall.RawSockaddrAny)
958 o.msg.Name = o.rsa
959 o.msg.Namelen = int32(unsafe.Sizeof(*o.rsa))
966 sa, err = o.rsa.Sockaddr(
    [all...]
  /external/ipsec-tools/src/racoon/
crypto_openssl.c 979 res = eay_rsa_verify(source, sig, evp->pkey.rsa);
988 * check RSA signature
993 eay_check_rsasign(source, sig, rsa)
996 RSA *rsa;
998 return eay_rsa_verify(source, sig, rsa);
1134 sig = eay_rsa_sign(src, evp->pkey.rsa);
1142 eay_get_rsasign(src, rsa)
1144 RSA *rsa;
    [all...]
  /external/curl/lib/vtls/
openssl.c 66 #include <openssl/rsa.h>
833 /* If RSA is used, don't check the private key if its flags indicate
843 RSA *rsa = EVP_PKEY_get1_RSA(priv_key); local
844 if(RSA_flags(rsa) & RSA_METHOD_FLAG_NO_CHECK)
846 RSA_free(rsa); /* Decrement reference count */
2849 RSA *rsa; local
    [all...]
  /device/google/contexthub/firmware/os/core/
appSec.c 23 #include <nanohub/rsa.h>
62 struct RsaState rsa; member in struct:AppSecState::__anon1714::__anon1716
387 result = BL.blRsaPubOpIterative(&state->rsa, state->rsaTmp, state->dataWords, &state->rsaState1, &state->rsaState2, &state->rsaStep);
391 //we just finished the RSA-ing
bl.c 26 #include <nanohub/rsa.h>
334 struct RsaState rsa; local
377 rsaResult = rsaPubOpIterative(&rsa, osSigHash, osSigPubkey, &rsaStateVar1, &rsaStateVar2, &rsaStep);
  /external/scapy/scapy/layers/tls/
cert.py 9 Supports both RSA and ECDSA objects.
39 from cryptography.hazmat.primitives.asymmetric import rsa
194 # This deals with the rare RSA 'kx export' call.
227 marker = b"RSA PUBLIC KEY"
254 Wrapper for RSA keys based on _EncryptAndVerifyRSA from crypto/pkcs1.py
262 private_key = rsa.generate_private_key(public_exponent=pubExp,
270 pubNum = rsa.RSAPublicNumbers(n=modulus, e=pubExp)
378 marker = b"RSA PRIVATE KEY"
411 indicate ecdsa-with-SHA512) and the result (e.g. RSA signing MD2).
416 subclasses accept any argument, be it from the RSA or ECDSA world
    [all...]
  /external/vboot_reference/host/lib21/
host_key.c 14 #include "2rsa.h"
133 /* Unpack RSA key */
252 /* Pack RSA key */
545 enum vb2_signature_algorithm vb2_rsa_sig_alg(struct rsa_st *rsa)
547 int bits = BN_num_bits(rsa->n);
  /system/tpm/trunks/
tpm_utility_test.cc 477 public_area.public_area.unique.rsa.size = 0;
499 public_area.public_area.unique.rsa.size = 0;
536 public_area.public_area.unique.rsa.size = 0;
562 public_area.public_area.unique.rsa.size = 0;
588 public_area.public_area.unique.rsa.size = 0;
612 public_area.public_area.unique.rsa.size = 0;
663 public_area.public_area.unique.rsa.size = 0;
691 public_area.public_area.unique.rsa.size = 0;
719 public_area.public_area.unique.rsa.size = 0;
741 public_area.public_area.unique.rsa.size = 0
    [all...]

Completed in 563 milliseconds

1 2 3 4 5 6 7 891011>>