/external/openssh/ |
H A D | rsa.h | 7 * RSA key generation, encryption and decryption. 22 int rsa_public_encrypt(BIGNUM *, BIGNUM *, RSA *); 23 int rsa_private_decrypt(BIGNUM *, BIGNUM *, RSA *); 24 int rsa_generate_additional_parameters(RSA *);
|
H A D | rsa.c | 37 * Description of the RSA algorithm can be found e.g. from the following 54 * The RSA Frequently Asked Questions document by RSA Data Security, 57 * RSA in 3 lines of perl by Adam Back <aba@atlax.ex.ac.uk>, 1995, as 75 rsa_public_encrypt(BIGNUM *out, BIGNUM *in, RSA *key) 121 rsa_private_decrypt(BIGNUM *out, BIGNUM *in, RSA *key) 162 rsa_generate_additional_parameters(RSA *rsa)
|
/external/boringssl/include/openssl/ |
H A D | rsa.h | 10 * apply to all code found in this distribution, be it the RC4, RSA, 71 /* rsa.h contains functions for handling encryption and signature using RSA. */ 76 /* RSA_new returns a new, empty RSA object or NULL on error. */ 77 OPENSSL_EXPORT RSA *RSA_new(void); 80 OPENSSL_EXPORT RSA *RSA_new_method(const ENGINE *engine); 84 OPENSSL_EXPORT void RSA_free(RSA *rsa); 87 OPENSSL_EXPORT int RSA_up_ref(RSA *rsa); 95 OPENSSL_EXPORT void RSA_get0_key(const RSA *rsa, const BIGNUM **out_n, 101 OPENSSL_EXPORT void RSA_get0_factors(const RSA *rsa, const BIGNUM **out_p, 109 OPENSSL_EXPORT void RSA_get0_crt_params(const RSA *rs [all...] |
/external/boringssl/src/include/openssl/ |
H A D | rsa.h | 10 * apply to all code found in this distribution, be it the RC4, RSA, 71 /* rsa.h contains functions for handling encryption and signature using RSA. */ 76 /* RSA_new returns a new, empty RSA object or NULL on error. */ 77 OPENSSL_EXPORT RSA *RSA_new(void); 80 OPENSSL_EXPORT RSA *RSA_new_method(const ENGINE *engine); 84 OPENSSL_EXPORT void RSA_free(RSA *rsa); 87 OPENSSL_EXPORT int RSA_up_ref(RSA *rsa); 95 OPENSSL_EXPORT void RSA_get0_key(const RSA *rsa, const BIGNUM **out_n, 101 OPENSSL_EXPORT void RSA_get0_factors(const RSA *rsa, const BIGNUM **out_p, 109 OPENSSL_EXPORT void RSA_get0_crt_params(const RSA *rs [all...] |
/external/boringssl/src/crypto/rsa/ |
H A D | rsa_asn1.c | 90 /* An RSA object may be missing some components. */ 91 OPENSSL_PUT_ERROR(RSA, RSA_R_VALUE_MISSING); 97 static RSA *parse_public_key(CBS *cbs, int buggy) { 98 RSA *ret = RSA_new(); 107 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_ENCODING); 114 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_RSA_PARAMETERS); 122 RSA *RSA_parse_public_key(CBS *cbs) { 126 RSA *RSA_parse_public_key_buggy(CBS *cbs) { 134 RSA *RSA_public_key_from_bytes(const uint8_t *in, size_t in_len) { 137 RSA *re [all...] |
H A D | internal.h | 10 * apply to all code found in this distribution, be it the RC4, RSA, 68 /* Default implementations of RSA operations. */ 72 size_t rsa_default_size(const RSA *rsa); 73 int rsa_default_encrypt(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out, 75 int rsa_default_sign_raw(RSA *rsa, size_t *out_len, uint8_t *out, 78 int rsa_default_decrypt(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out, 80 int rsa_default_private_transform(RSA *rsa, uint8_t *out, const uint8_t *in, 82 int rsa_default_multi_prime_keygen(RSA *rsa, int bits, int num_primes, 84 int rsa_default_keygen(RSA *rsa, int bits, BIGNUM *e_value, BN_GENCB *cb); 116 int RSA_private_transform(RSA *rs [all...] |
H A D | rsa.c | 10 * apply to all code found in this distribution, be it the RC4, RSA, 76 RSA *RSA_new(void) { return RSA_new_method(NULL); } 78 RSA *RSA_new_method(const ENGINE *engine) { 79 RSA *rsa = OPENSSL_malloc(sizeof(RSA)); 81 OPENSSL_PUT_ERROR(RSA, ERR_R_MALLOC_FAILURE); 85 OPENSSL_memset(rsa, 0, sizeof(RSA)); 125 void RSA_free(RSA *rsa) { 167 int RSA_up_ref(RSA *rsa) { 172 void RSA_get0_key(const RSA *rs [all...] |
H A D | padding.c | 78 OPENSSL_PUT_ERROR(RSA, RSA_R_KEY_SIZE_TOO_SMALL); 83 OPENSSL_PUT_ERROR(RSA, RSA_R_DATA_TOO_LARGE_FOR_KEY_SIZE); 101 OPENSSL_PUT_ERROR(RSA, RSA_R_DATA_TOO_SMALL); 107 OPENSSL_PUT_ERROR(RSA, RSA_R_BLOCK_TYPE_IS_NOT_01); 120 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_FIXED_HEADER_DECRYPT); 128 OPENSSL_PUT_ERROR(RSA, RSA_R_NULL_BEFORE_BLOCK_MISSING); 133 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_PAD_BYTE_COUNT); 139 OPENSSL_PUT_ERROR(RSA, RSA_R_DATA_TOO_LARGE); 167 OPENSSL_PUT_ERROR(RSA, RSA_R_KEY_SIZE_TOO_SMALL); 172 OPENSSL_PUT_ERROR(RSA, RSA_R_DATA_TOO_LARGE_FOR_KEY_SIZ [all...] |
H A D | rsa_impl.c | 10 * apply to all code found in this distribution, be it the RC4, RSA, 72 static int check_modulus_and_exponent_sizes(const RSA *rsa) { 76 OPENSSL_PUT_ERROR(RSA, RSA_R_MODULUS_TOO_LARGE); 92 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_E_VALUE); 98 * is much smaller than the minimum RSA key size that any application should 101 OPENSSL_PUT_ERROR(RSA, RSA_R_KEY_SIZE_TOO_SMALL); 109 size_t rsa_default_size(const RSA *rsa) { 113 int rsa_default_encrypt(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out, 122 OPENSSL_PUT_ERROR(RSA, RSA_R_OUTPUT_BUFFER_TOO_SMALL); 140 OPENSSL_PUT_ERROR(RSA, ERR_R_MALLOC_FAILUR [all...] |
H A D | blinding.c | 62 * apply to all code found in this distribution, be it the RC4, RSA, 135 OPENSSL_PUT_ERROR(RSA, ERR_R_MALLOC_FAILURE); 224 OPENSSL_PUT_ERROR(RSA, ERR_R_INTERNAL_ERROR); 231 OPENSSL_PUT_ERROR(RSA, ERR_R_INTERNAL_ERROR); 241 OPENSSL_PUT_ERROR(RSA, ERR_R_INTERNAL_ERROR); 245 /* For reasonably-sized RSA keys, it should almost never be the case that a 248 OPENSSL_PUT_ERROR(RSA, RSA_R_TOO_MANY_ITERATIONS); 255 OPENSSL_PUT_ERROR(RSA, ERR_R_INTERNAL_ERROR); 260 OPENSSL_PUT_ERROR(RSA, ERR_R_INTERNAL_ERROR);
|
/external/ipsec-tools/src/racoon/ |
H A D | rsalist.h | 52 RSA *rsa; 55 int rsa_key_insert(struct genlist *list, struct netaddr *src, struct netaddr *dst, RSA *rsa); 59 RSA *rsa_try_check_rsasign(vchar_t *source, vchar_t *sig, struct genlist *list);
|
H A D | prsa_par.h | 96 RSA *rsa;
|
H A D | crypto_openssl.h | 63 extern int eay_check_rsasign __P((vchar_t *, vchar_t *, RSA *)); 64 extern vchar_t *eay_get_rsasign __P((vchar_t *, RSA *)); 66 /* RSA */ 67 extern vchar_t *eay_rsa_sign __P((vchar_t *, RSA *)); 68 extern int eay_rsa_verify __P((vchar_t *, vchar_t *, RSA *)); 220 RSA *base64_pubkey2rsa(char *in); 221 RSA *bignum_pubkey2rsa(BIGNUM *in);
|
/external/boringssl/src/crypto/pem/ |
H A D | pem_all.c | 10 * apply to all code found in this distribution, be it the RC4, RSA, 122 static RSA *pkey_get_rsa(EVP_PKEY *key, RSA **rsa); 132 * We treat RSA or DSA private keys as a special case. For private keys we 137 static RSA *pkey_get_rsa(EVP_PKEY *key, RSA **rsa) 139 RSA *rtmp; 153 RSA *PEM_read_bio_RSAPrivateKey(BIO *bp, RSA **rsa, pem_password_cb *cb, 163 RSA *PEM_read_RSAPrivateKe [all...] |
/external/vboot_reference/host/lib/include/ |
H A D | host_key.h | 15 typedef struct rsa_st RSA; typedef in typeref:struct:rsa_st 19 RSA* rsa_private_key; /* Private key data */
|
/external/boringssl/src/decrepit/rsa/ |
H A D | rsa_decrepit.c | 10 * apply to all code found in this distribution, be it the RC4, RSA, 64 RSA *RSA_generate_key(int bits, unsigned long e_value, void *callback, 69 RSA *rsa = RSA_new(); 88 int RSA_padding_add_PKCS1_PSS(RSA *rsa, uint8_t *EM, const uint8_t *mHash, 93 int RSA_verify_PKCS1_PSS(RSA *rsa, const uint8_t *mHash, const EVP_MD *Hash,
|
/external/boringssl/src/ssl/ |
H A D | ssl_privkey_cc.cc | 10 * apply to all code found in this distribution, be it the RC4, RSA, 69 bssl::UniquePtr<RSA> rsa(RSA_private_key_from_bytes(der, der_len));
|
/external/avb/test/ |
H A D | avb_atx_generate_test_data | 54 openssl genpkey -algorithm RSA -pkeyopt rsa_keygen_bits:4096 -outform PEM \ 56 openssl genpkey -algorithm RSA -pkeyopt rsa_keygen_bits:4096 -outform PEM \ 58 openssl genpkey -algorithm RSA -pkeyopt rsa_keygen_bits:4096 -outform PEM \
|
/external/boringssl/src/crypto/x509/ |
H A D | x_all.c | 10 * apply to all code found in this distribution, be it the RC4, RSA, 202 RSA *d2i_RSAPrivateKey_fp(FILE *fp, RSA **rsa) 204 return ASN1_d2i_fp_of(RSA, RSA_new, d2i_RSAPrivateKey, fp, rsa); 207 int i2d_RSAPrivateKey_fp(FILE *fp, RSA *rsa) 209 return ASN1_i2d_fp_of_const(RSA, i2d_RSAPrivateKey, fp, rsa); 212 RSA *d2i_RSAPublicKey_fp(FILE *fp, RSA **rsa) 214 return ASN1_d2i_fp_of(RSA, RSA_new, d2i_RSAPublicKey, fp, rsa); 217 RSA *d2i_RSA_PUBKEY_f [all...] |
H A D | x_pubkey.c | 10 * apply to all code found in this distribution, be it the RC4, RSA, 220 * The following are equivalents but which return RSA and DSA keys 222 RSA *d2i_RSA_PUBKEY(RSA **a, const unsigned char **pp, long length) 225 RSA *key; 243 int i2d_RSA_PUBKEY(const RSA *a, unsigned char **pp) 254 EVP_PKEY_set1_RSA(pktmp, (RSA *)a);
|
/external/google-tv-pairing-protocol/cpp/tests/polo/util/ |
H A D | certificateutiltest.cc | 56 std::string rsa_string = "-----BEGIN RSA PRIVATE KEY-----\n" 70 "-----END RSA PRIVATE KEY-----\n"; 73 RSA* rsa = PEM_read_bio_RSAPrivateKey(rsa_bio, NULL, NULL, NULL); 116 std::string pem = "-----BEGIN RSA PRIVATE KEY-----\n" 133 "-----END RSA PRIVATE KEY-----\n"; 139 RSA* rsa = EVP_PKEY_get1_RSA(pkey); 148 RSA* rsa = RSA_generate_key(1025, RSA_F4, NULL, NULL);
|
/external/vboot_reference/scripts/ |
H A D | genpadding.sh | 8 # various combinations of RSA key lengths and message digest algorithms. 45 * arrays corresponding to various combinations of algorithms for RSA signatures. 56 * PKCS 1.5 padding (from the RSA PKCS#1 v2.1 standard) 58 * Depending on the RSA key size and hash function, the padding is calculated 73 * PS: octet string consisting of {Length(RSA Key) - Length(T) - 3} 0xFF
|
/external/boringssl/src/crypto/evp/ |
H A D | evp.c | 10 * apply to all code found in this distribution, be it the RC4, RSA, 221 int EVP_PKEY_set1_RSA(EVP_PKEY *pkey, RSA *key) { 229 int EVP_PKEY_assign_RSA(EVP_PKEY *pkey, RSA *key) { 233 RSA *EVP_PKEY_get0_RSA(EVP_PKEY *pkey) { 241 RSA *EVP_PKEY_get1_RSA(EVP_PKEY *pkey) { 242 RSA *rsa = EVP_PKEY_get0_RSA(pkey);
|
/external/vboot_reference/utility/ |
H A D | dumpRSAPublicKey.c | 7 * support for additional RSA key sizes. (platform/system/core,git/libmincrypt 17 /* Command line tool to extract RSA public keys from X.509 certificates 18 * and output a pre-processed version of keys for use by RSA verification 22 int check(RSA* key) { 39 /* Pre-processes and outputs RSA public key to standard out. 41 void output(RSA* key) { 52 /* Output size of RSA key in 32-bit words */ 140 RSA* pubkey = NULL; 176 fprintf(stderr, "Couldn't convert to a RSA style key.\n");
|
/external/google-tv-pairing-protocol/cpp/src/polo/pairing/ |
H A D | polochallengeresponse.cc | 38 RSA* client_pub_rsa = EVP_PKEY_get1_RSA(client_pkey); 48 RSA* server_pub_rsa = EVP_PKEY_get1_RSA(server_pkey);
|