Searched refs:RSA (Results 1 - 25 of 100) sorted by relevance

1234

/external/openssh/
H A Drsa.h7 * RSA key generation, encryption and decryption.
22 int rsa_public_encrypt(BIGNUM *, BIGNUM *, RSA *);
23 int rsa_private_decrypt(BIGNUM *, BIGNUM *, RSA *);
24 int rsa_generate_additional_parameters(RSA *);
H A Drsa.c37 * Description of the RSA algorithm can be found e.g. from the following
54 * The RSA Frequently Asked Questions document by RSA Data Security,
57 * RSA in 3 lines of perl by Adam Back <aba@atlax.ex.ac.uk>, 1995, as
75 rsa_public_encrypt(BIGNUM *out, BIGNUM *in, RSA *key)
121 rsa_private_decrypt(BIGNUM *out, BIGNUM *in, RSA *key)
162 rsa_generate_additional_parameters(RSA *rsa)
/external/boringssl/include/openssl/
H A Drsa.h10 * apply to all code found in this distribution, be it the RC4, RSA,
71 /* rsa.h contains functions for handling encryption and signature using RSA. */
76 /* RSA_new returns a new, empty RSA object or NULL on error. */
77 OPENSSL_EXPORT RSA *RSA_new(void);
80 OPENSSL_EXPORT RSA *RSA_new_method(const ENGINE *engine);
84 OPENSSL_EXPORT void RSA_free(RSA *rsa);
87 OPENSSL_EXPORT int RSA_up_ref(RSA *rsa);
95 OPENSSL_EXPORT void RSA_get0_key(const RSA *rsa, const BIGNUM **out_n,
101 OPENSSL_EXPORT void RSA_get0_factors(const RSA *rsa, const BIGNUM **out_p,
109 OPENSSL_EXPORT void RSA_get0_crt_params(const RSA *rs
[all...]
/external/boringssl/src/include/openssl/
H A Drsa.h10 * apply to all code found in this distribution, be it the RC4, RSA,
71 /* rsa.h contains functions for handling encryption and signature using RSA. */
76 /* RSA_new returns a new, empty RSA object or NULL on error. */
77 OPENSSL_EXPORT RSA *RSA_new(void);
80 OPENSSL_EXPORT RSA *RSA_new_method(const ENGINE *engine);
84 OPENSSL_EXPORT void RSA_free(RSA *rsa);
87 OPENSSL_EXPORT int RSA_up_ref(RSA *rsa);
95 OPENSSL_EXPORT void RSA_get0_key(const RSA *rsa, const BIGNUM **out_n,
101 OPENSSL_EXPORT void RSA_get0_factors(const RSA *rsa, const BIGNUM **out_p,
109 OPENSSL_EXPORT void RSA_get0_crt_params(const RSA *rs
[all...]
/external/boringssl/src/crypto/rsa/
H A Drsa_asn1.c90 /* An RSA object may be missing some components. */
91 OPENSSL_PUT_ERROR(RSA, RSA_R_VALUE_MISSING);
97 static RSA *parse_public_key(CBS *cbs, int buggy) {
98 RSA *ret = RSA_new();
107 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_ENCODING);
114 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_RSA_PARAMETERS);
122 RSA *RSA_parse_public_key(CBS *cbs) {
126 RSA *RSA_parse_public_key_buggy(CBS *cbs) {
134 RSA *RSA_public_key_from_bytes(const uint8_t *in, size_t in_len) {
137 RSA *re
[all...]
H A Dinternal.h10 * apply to all code found in this distribution, be it the RC4, RSA,
68 /* Default implementations of RSA operations. */
72 size_t rsa_default_size(const RSA *rsa);
73 int rsa_default_encrypt(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out,
75 int rsa_default_sign_raw(RSA *rsa, size_t *out_len, uint8_t *out,
78 int rsa_default_decrypt(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out,
80 int rsa_default_private_transform(RSA *rsa, uint8_t *out, const uint8_t *in,
82 int rsa_default_multi_prime_keygen(RSA *rsa, int bits, int num_primes,
84 int rsa_default_keygen(RSA *rsa, int bits, BIGNUM *e_value, BN_GENCB *cb);
116 int RSA_private_transform(RSA *rs
[all...]
H A Drsa.c10 * apply to all code found in this distribution, be it the RC4, RSA,
76 RSA *RSA_new(void) { return RSA_new_method(NULL); }
78 RSA *RSA_new_method(const ENGINE *engine) {
79 RSA *rsa = OPENSSL_malloc(sizeof(RSA));
81 OPENSSL_PUT_ERROR(RSA, ERR_R_MALLOC_FAILURE);
85 OPENSSL_memset(rsa, 0, sizeof(RSA));
125 void RSA_free(RSA *rsa) {
167 int RSA_up_ref(RSA *rsa) {
172 void RSA_get0_key(const RSA *rs
[all...]
H A Dpadding.c78 OPENSSL_PUT_ERROR(RSA, RSA_R_KEY_SIZE_TOO_SMALL);
83 OPENSSL_PUT_ERROR(RSA, RSA_R_DATA_TOO_LARGE_FOR_KEY_SIZE);
101 OPENSSL_PUT_ERROR(RSA, RSA_R_DATA_TOO_SMALL);
107 OPENSSL_PUT_ERROR(RSA, RSA_R_BLOCK_TYPE_IS_NOT_01);
120 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_FIXED_HEADER_DECRYPT);
128 OPENSSL_PUT_ERROR(RSA, RSA_R_NULL_BEFORE_BLOCK_MISSING);
133 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_PAD_BYTE_COUNT);
139 OPENSSL_PUT_ERROR(RSA, RSA_R_DATA_TOO_LARGE);
167 OPENSSL_PUT_ERROR(RSA, RSA_R_KEY_SIZE_TOO_SMALL);
172 OPENSSL_PUT_ERROR(RSA, RSA_R_DATA_TOO_LARGE_FOR_KEY_SIZ
[all...]
H A Drsa_impl.c10 * apply to all code found in this distribution, be it the RC4, RSA,
72 static int check_modulus_and_exponent_sizes(const RSA *rsa) {
76 OPENSSL_PUT_ERROR(RSA, RSA_R_MODULUS_TOO_LARGE);
92 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_E_VALUE);
98 * is much smaller than the minimum RSA key size that any application should
101 OPENSSL_PUT_ERROR(RSA, RSA_R_KEY_SIZE_TOO_SMALL);
109 size_t rsa_default_size(const RSA *rsa) {
113 int rsa_default_encrypt(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out,
122 OPENSSL_PUT_ERROR(RSA, RSA_R_OUTPUT_BUFFER_TOO_SMALL);
140 OPENSSL_PUT_ERROR(RSA, ERR_R_MALLOC_FAILUR
[all...]
H A Dblinding.c62 * apply to all code found in this distribution, be it the RC4, RSA,
135 OPENSSL_PUT_ERROR(RSA, ERR_R_MALLOC_FAILURE);
224 OPENSSL_PUT_ERROR(RSA, ERR_R_INTERNAL_ERROR);
231 OPENSSL_PUT_ERROR(RSA, ERR_R_INTERNAL_ERROR);
241 OPENSSL_PUT_ERROR(RSA, ERR_R_INTERNAL_ERROR);
245 /* For reasonably-sized RSA keys, it should almost never be the case that a
248 OPENSSL_PUT_ERROR(RSA, RSA_R_TOO_MANY_ITERATIONS);
255 OPENSSL_PUT_ERROR(RSA, ERR_R_INTERNAL_ERROR);
260 OPENSSL_PUT_ERROR(RSA, ERR_R_INTERNAL_ERROR);
/external/ipsec-tools/src/racoon/
H A Drsalist.h52 RSA *rsa;
55 int rsa_key_insert(struct genlist *list, struct netaddr *src, struct netaddr *dst, RSA *rsa);
59 RSA *rsa_try_check_rsasign(vchar_t *source, vchar_t *sig, struct genlist *list);
H A Dprsa_par.h96 RSA *rsa;
H A Dcrypto_openssl.h63 extern int eay_check_rsasign __P((vchar_t *, vchar_t *, RSA *));
64 extern vchar_t *eay_get_rsasign __P((vchar_t *, RSA *));
66 /* RSA */
67 extern vchar_t *eay_rsa_sign __P((vchar_t *, RSA *));
68 extern int eay_rsa_verify __P((vchar_t *, vchar_t *, RSA *));
220 RSA *base64_pubkey2rsa(char *in);
221 RSA *bignum_pubkey2rsa(BIGNUM *in);
/external/boringssl/src/crypto/pem/
H A Dpem_all.c10 * apply to all code found in this distribution, be it the RC4, RSA,
122 static RSA *pkey_get_rsa(EVP_PKEY *key, RSA **rsa);
132 * We treat RSA or DSA private keys as a special case. For private keys we
137 static RSA *pkey_get_rsa(EVP_PKEY *key, RSA **rsa)
139 RSA *rtmp;
153 RSA *PEM_read_bio_RSAPrivateKey(BIO *bp, RSA **rsa, pem_password_cb *cb,
163 RSA *PEM_read_RSAPrivateKe
[all...]
/external/vboot_reference/host/lib/include/
H A Dhost_key.h15 typedef struct rsa_st RSA; typedef in typeref:struct:rsa_st
19 RSA* rsa_private_key; /* Private key data */
/external/boringssl/src/decrepit/rsa/
H A Drsa_decrepit.c10 * apply to all code found in this distribution, be it the RC4, RSA,
64 RSA *RSA_generate_key(int bits, unsigned long e_value, void *callback,
69 RSA *rsa = RSA_new();
88 int RSA_padding_add_PKCS1_PSS(RSA *rsa, uint8_t *EM, const uint8_t *mHash,
93 int RSA_verify_PKCS1_PSS(RSA *rsa, const uint8_t *mHash, const EVP_MD *Hash,
/external/boringssl/src/ssl/
H A Dssl_privkey_cc.cc10 * apply to all code found in this distribution, be it the RC4, RSA,
69 bssl::UniquePtr<RSA> rsa(RSA_private_key_from_bytes(der, der_len));
/external/avb/test/
H A Davb_atx_generate_test_data54 openssl genpkey -algorithm RSA -pkeyopt rsa_keygen_bits:4096 -outform PEM \
56 openssl genpkey -algorithm RSA -pkeyopt rsa_keygen_bits:4096 -outform PEM \
58 openssl genpkey -algorithm RSA -pkeyopt rsa_keygen_bits:4096 -outform PEM \
/external/boringssl/src/crypto/x509/
H A Dx_all.c10 * apply to all code found in this distribution, be it the RC4, RSA,
202 RSA *d2i_RSAPrivateKey_fp(FILE *fp, RSA **rsa)
204 return ASN1_d2i_fp_of(RSA, RSA_new, d2i_RSAPrivateKey, fp, rsa);
207 int i2d_RSAPrivateKey_fp(FILE *fp, RSA *rsa)
209 return ASN1_i2d_fp_of_const(RSA, i2d_RSAPrivateKey, fp, rsa);
212 RSA *d2i_RSAPublicKey_fp(FILE *fp, RSA **rsa)
214 return ASN1_d2i_fp_of(RSA, RSA_new, d2i_RSAPublicKey, fp, rsa);
217 RSA *d2i_RSA_PUBKEY_f
[all...]
H A Dx_pubkey.c10 * apply to all code found in this distribution, be it the RC4, RSA,
220 * The following are equivalents but which return RSA and DSA keys
222 RSA *d2i_RSA_PUBKEY(RSA **a, const unsigned char **pp, long length)
225 RSA *key;
243 int i2d_RSA_PUBKEY(const RSA *a, unsigned char **pp)
254 EVP_PKEY_set1_RSA(pktmp, (RSA *)a);
/external/google-tv-pairing-protocol/cpp/tests/polo/util/
H A Dcertificateutiltest.cc56 std::string rsa_string = "-----BEGIN RSA PRIVATE KEY-----\n"
70 "-----END RSA PRIVATE KEY-----\n";
73 RSA* rsa = PEM_read_bio_RSAPrivateKey(rsa_bio, NULL, NULL, NULL);
116 std::string pem = "-----BEGIN RSA PRIVATE KEY-----\n"
133 "-----END RSA PRIVATE KEY-----\n";
139 RSA* rsa = EVP_PKEY_get1_RSA(pkey);
148 RSA* rsa = RSA_generate_key(1025, RSA_F4, NULL, NULL);
/external/vboot_reference/scripts/
H A Dgenpadding.sh8 # various combinations of RSA key lengths and message digest algorithms.
45 * arrays corresponding to various combinations of algorithms for RSA signatures.
56 * PKCS 1.5 padding (from the RSA PKCS#1 v2.1 standard)
58 * Depending on the RSA key size and hash function, the padding is calculated
73 * PS: octet string consisting of {Length(RSA Key) - Length(T) - 3} 0xFF
/external/boringssl/src/crypto/evp/
H A Devp.c10 * apply to all code found in this distribution, be it the RC4, RSA,
221 int EVP_PKEY_set1_RSA(EVP_PKEY *pkey, RSA *key) {
229 int EVP_PKEY_assign_RSA(EVP_PKEY *pkey, RSA *key) {
233 RSA *EVP_PKEY_get0_RSA(EVP_PKEY *pkey) {
241 RSA *EVP_PKEY_get1_RSA(EVP_PKEY *pkey) {
242 RSA *rsa = EVP_PKEY_get0_RSA(pkey);
/external/vboot_reference/utility/
H A DdumpRSAPublicKey.c7 * support for additional RSA key sizes. (platform/system/core,git/libmincrypt
17 /* Command line tool to extract RSA public keys from X.509 certificates
18 * and output a pre-processed version of keys for use by RSA verification
22 int check(RSA* key) {
39 /* Pre-processes and outputs RSA public key to standard out.
41 void output(RSA* key) {
52 /* Output size of RSA key in 32-bit words */
140 RSA* pubkey = NULL;
176 fprintf(stderr, "Couldn't convert to a RSA style key.\n");
/external/google-tv-pairing-protocol/cpp/src/polo/pairing/
H A Dpolochallengeresponse.cc38 RSA* client_pub_rsa = EVP_PKEY_get1_RSA(client_pkey);
48 RSA* server_pub_rsa = EVP_PKEY_get1_RSA(server_pkey);

Completed in 2253 milliseconds

1234