/external/ipsec-tools/src/racoon/ |
H A D | rsalist.h | 38 #include <openssl/rsa.h> 52 RSA *rsa; member in struct:rsa_key 55 int rsa_key_insert(struct genlist *list, struct netaddr *src, struct netaddr *dst, RSA *rsa);
|
H A D | prsa_par.h | 96 RSA *rsa; member in union:YYSTYPE
|
H A D | rsalist.c | 46 #include <openssl/rsa.h> 69 struct netaddr *dst, RSA *rsa) 74 rsa_key->rsa = rsa; 100 RSA_print_fp(stdout, key->rsa, 4); 209 if (eay_check_rsasign(source, sig, key->rsa) == 0) { 211 return key->rsa; 68 rsa_key_insert(struct genlist *list, struct netaddr *src, struct netaddr *dst, RSA *rsa) argument
|
/external/openssl/crypto/rsa/ |
H A D | rsa_depr.c | 1 /* crypto/rsa/rsa_depr.c */ 63 #include <openssl/rsa.h> 76 RSA *rsa = RSA_new(); local 79 if(!rsa || !e) goto err; 92 if(RSA_generate_key_ex(rsa, bits, e, &cb)) { 94 return rsa; 98 if(rsa) RSA_free(rsa);
|
H A D | rsa_null.c | 62 #include <openssl/rsa.h> 73 unsigned char *to, RSA *rsa,int padding); 75 unsigned char *to, RSA *rsa,int padding); 77 unsigned char *to, RSA *rsa,int padding); 79 unsigned char *to, RSA *rsa,int padding); 81 static int RSA_null_mod_exp(const BIGNUM *r0, const BIGNUM *i, RSA *rsa); 83 static int RSA_null_init(RSA *rsa); 84 static int RSA_null_finish(RSA *rsa); 108 unsigned char *to, RSA *rsa, int padding) 115 unsigned char *to, RSA *rsa, in 107 RSA_null_public_encrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 114 RSA_null_private_encrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 121 RSA_null_private_decrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 128 RSA_null_public_decrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 143 RSA_null_init(RSA *rsa) argument 148 RSA_null_finish(RSA *rsa) argument [all...] |
H A D | rsa_saos.c | 1 /* crypto/rsa/rsa_saos.c */ 62 #include <openssl/rsa.h> 68 unsigned char *sigret, unsigned int *siglen, RSA *rsa) 79 j=RSA_size(rsa); 93 i=RSA_private_encrypt(i,s,sigret,rsa,RSA_PKCS1_PADDING); 107 RSA *rsa) 114 if (siglen != (unsigned int)RSA_size(rsa)) 126 i=RSA_public_decrypt((int)siglen,sigbuf,s,rsa,RSA_PKCS1_PADDING); 66 RSA_sign_ASN1_OCTET_STRING(int type, const unsigned char *m, unsigned int m_len, unsigned char *sigret, unsigned int *siglen, RSA *rsa) argument 104 RSA_verify_ASN1_OCTET_STRING(int dtype, const unsigned char *m, unsigned int m_len, unsigned char *sigbuf, unsigned int siglen, RSA *rsa) argument
|
H A D | rsa_crpt.c | 1 /* crypto/rsa/rsa_lib.c */ 64 #include <openssl/rsa.h> 76 RSA *rsa, int padding) 79 if (FIPS_mode() && !(rsa->meth->flags & RSA_FLAG_FIPS_METHOD) 80 && !(rsa->flags & RSA_FLAG_NON_FIPS_ALLOW)) 86 return(rsa->meth->rsa_pub_enc(flen, from, to, rsa, padding)); 90 RSA *rsa, int padding) 93 if (FIPS_mode() && !(rsa->meth->flags & RSA_FLAG_FIPS_METHOD) 94 && !(rsa 75 RSA_public_encrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 89 RSA_private_encrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 103 RSA_private_decrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 117 RSA_public_decrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) argument 136 RSA_blinding_off(RSA *rsa) argument 147 RSA_blinding_on(RSA *rsa, BN_CTX *ctx) argument 190 RSA_setup_blinding(RSA *rsa, BN_CTX *in_ctx) argument [all...] |
H A D | rsa_gen.c | 1 /* crypto/rsa/rsa_gen.c */ 69 #include <openssl/rsa.h> 74 static int rsa_builtin_keygen(RSA *rsa, int bits, BIGNUM *e_value, BN_GENCB *cb); 81 int RSA_generate_key_ex(RSA *rsa, int bits, BIGNUM *e_value, BN_GENCB *cb) argument 84 if (FIPS_mode() && !(rsa->meth->flags & RSA_FLAG_FIPS_METHOD) 85 && !(rsa->flags & RSA_FLAG_NON_FIPS_ALLOW)) 91 if(rsa->meth->rsa_keygen) 92 return rsa->meth->rsa_keygen(rsa, bits, e_value, cb); 95 return FIPS_rsa_generate_key_ex(rsa, bit 100 rsa_builtin_keygen(RSA *rsa, int bits, BIGNUM *e_value, BN_GENCB *cb) argument [all...] |
H A D | rsa_pss.c | 62 #include <openssl/rsa.h> 73 int RSA_verify_PKCS1_PSS(RSA *rsa, const unsigned char *mHash, argument 76 return RSA_verify_PKCS1_PSS_mgf1(rsa, mHash, Hash, NULL, EM, sLen); 79 int RSA_verify_PKCS1_PSS_mgf1(RSA *rsa, const unsigned char *mHash, argument 112 MSBits = (BN_num_bits(rsa->n) - 1) & 0x7; 113 emLen = RSA_size(rsa); 187 int RSA_padding_add_PKCS1_PSS(RSA *rsa, unsigned char *EM, argument 191 return RSA_padding_add_PKCS1_PSS_mgf1(rsa, EM, mHash, Hash, NULL, sLen); 194 int RSA_padding_add_PKCS1_PSS_mgf1(RSA *rsa, unsigned char *EM, argument 224 MSBits = (BN_num_bits(rsa [all...] |
H A D | rsa_sign.c | 1 /* crypto/rsa/rsa_sign.c */ 62 #include <openssl/rsa.h> 71 unsigned char *sigret, unsigned int *siglen, RSA *rsa) 81 if (FIPS_mode() && !(rsa->meth->flags & RSA_FLAG_FIPS_METHOD) 82 && !(rsa->flags & RSA_FLAG_NON_FIPS_ALLOW)) 88 if((rsa->flags & RSA_FLAG_SIGN_VER) && rsa->meth->rsa_sign) 90 return rsa->meth->rsa_sign(type, m, m_len, 91 sigret, siglen, rsa); 124 j=RSA_size(rsa); 70 RSA_sign(int type, const unsigned char *m, unsigned int m_len, unsigned char *sigret, unsigned int *siglen, RSA *rsa) argument 154 int_rsa_verify(int dtype, const unsigned char *m, unsigned int m_len, unsigned char *rm, size_t *prm_len, const unsigned char *sigbuf, size_t siglen, RSA *rsa) argument 306 RSA_verify(int dtype, const unsigned char *m, unsigned int m_len, const unsigned char *sigbuf, unsigned int siglen, RSA *rsa) argument [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/rsa/ |
H A D | RSAUtil.java | 1 package org.bouncycastle.jcajce.provider.asymmetric.rsa;
|
H A D | AlgorithmParametersSpi.java | 1 package org.bouncycastle.jcajce.provider.asymmetric.rsa;
|
H A D | KeyFactorySpi.java | 1 package org.bouncycastle.jcajce.provider.asymmetric.rsa;
|
H A D | KeyPairGeneratorSpi.java | 1 package org.bouncycastle.jcajce.provider.asymmetric.rsa;
|
H A D | BCRSAPublicKey.java | 1 package org.bouncycastle.jcajce.provider.asymmetric.rsa;
|
H A D | BCRSAPrivateCrtKey.java | 1 package org.bouncycastle.jcajce.provider.asymmetric.rsa;
|
H A D | BCRSAPrivateKey.java | 1 package org.bouncycastle.jcajce.provider.asymmetric.rsa;
|
H A D | CipherSpi.java | 1 package org.bouncycastle.jcajce.provider.asymmetric.rsa;
|
H A D | DigestSignatureSpi.java | 1 package org.bouncycastle.jcajce.provider.asymmetric.rsa;
|
/external/openssh/ |
H A D | rsa.c | 1 /* $OpenBSD: rsa.c,v 1.29 2006/11/06 21:25:28 markus Exp $ */ 71 #include "rsa.h" 132 rsa_generate_additional_parameters(RSA *rsa) argument 142 if ((BN_sub(aux, rsa->q, BN_value_one()) == 0) || 143 (BN_mod(rsa->dmq1, rsa->d, aux, ctx) == 0) || 144 (BN_sub(aux, rsa->p, BN_value_one()) == 0) || 145 (BN_mod(rsa->dmp1, rsa->d, aux, ctx) == 0))
|
H A D | key.h | 30 #include <openssl/rsa.h> 79 RSA *rsa; member in struct:Key
|
H A D | ssh-pkcs11-client.c | 104 pkcs11_rsa_private_encrypt(int flen, const u_char *from, u_char *to, RSA *rsa, argument 116 key.rsa = rsa; 129 if (slen <= (u_int)RSA_size(rsa)) { 140 wrap_key(RSA *rsa) argument 147 RSA_set_method(rsa, &helper_rsa); 208 wrap_key(k->rsa);
|
/external/chromium/third_party/libjingle/source/talk/base/ |
H A D | opensslidentity.cc | 35 #include <openssl/rsa.h> 61 RSA* rsa = RSA_generate_key(KEY_LENGTH, 0x10001, NULL, NULL); local 62 if (!EVP_PKEY_assign_RSA(pkey, rsa)) { 64 RSA_free(rsa); 70 RSA* rsa = RSA_new(); local 71 if (!pkey || !exponent || !rsa || 73 !RSA_generate_key_ex(rsa, KEY_LENGTH, exponent, NULL) || 74 !EVP_PKEY_assign_RSA(pkey, rsa)) { 77 RSA_free(rsa); 80 // ownership of rsa struc [all...] |
/external/openssh/openbsd-compat/ |
H A D | openssl-compat.c | 30 # include <openssl/rsa.h> 83 RSA_generate_key_ex(RSA *rsa, int bits, BIGNUM *bn_e, void *cb) argument 96 /* swap rsa/new_rsa then free new_rsa */ 97 tmp_rsa = *rsa; 98 *rsa = *new_rsa;
|
/external/openssl/apps/ |
H A D | genrsa.c | 75 #include <openssl/rsa.h> 108 RSA *rsa = NULL; local 269 rsa = RSA_new(); 271 rsa = RSA_new_method(e); 273 if (!rsa) 276 if(!BN_set_word(bn, f4) || !RSA_generate_key_ex(rsa, num, bn, &cb)) 284 for (i=0; i<rsa->e->top; i++) 290 l+=rsa->e->d[i]; 297 if (!PEM_write_bio_RSAPrivateKey(out,rsa,enc,NULL,0, 305 if (rsa) RSA_fre [all...] |