/external/boringssl/src/decrepit/rsa/ |
rsa_decrepit.c | 10 * apply to all code found in this distribution, be it the RC4, RSA, 57 #include <openssl/rsa.h> 64 RSA *RSA_generate_key(int bits, unsigned long e_value, void *callback, 69 RSA *rsa = RSA_new(); local 72 if (rsa == NULL || 75 !RSA_generate_key_ex(rsa, bits, e, NULL)) { 80 return rsa; 84 RSA_free(rsa);
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/ |
create_timing_table.py | 4 import rsa namespace 17 rsa.newkeys(bitsize, accurate=accurate, poolsize=poolsize)
|
setup.py | 5 import rsa namespace 7 setup(name='rsa', 8 version=rsa.__version__, 9 description='Pure-Python RSA implementation', 14 url='http://stuvel.eu/rsa', 15 packages=['rsa'], 32 'pyrsa-priv2pub = rsa.util:private_to_public', 33 'pyrsa-keygen = rsa.cli:keygen', 34 'pyrsa-encrypt = rsa.cli:encrypt', 35 'pyrsa-decrypt = rsa.cli:decrypt' [all...] |
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/func/ |
CipherRSATest.java | 23 CipherRSAThread rsa = new CipherRSAThread("RSA", new int[] {512}, local 28 rsa.launcher(); 30 assertEquals(rsa.getFailureMessages(), 0, rsa.getTotalFailuresNumber()); 35 CipherRSAThread rsa = new CipherRSAThread("RSA", new int[] {1024}, local 40 rsa.launcher(); 42 assertEquals(rsa.getFailureMessages(), 0, rsa.getTotalFailuresNumber()) 47 CipherRSAThread rsa = new CipherRSAThread("RSA", new int[] {2048}, local 57 CipherRSAThread rsa = new CipherRSAThread("RSA", new int[] {1024}, local [all...] |
/external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/rsa/ |
util.py | 24 import rsa.key namespace 65 priv_key = rsa.key.PrivateKey.load_pkcs1(in_data, cli.inform) 66 pub_key = rsa.key.PublicKey(priv_key.n, priv_key.e)
|
parallel.py | 19 Introduced in Python-RSA 3.1. 31 import rsa.prime namespace 32 import rsa.randnum namespace 36 integer = rsa.randnum.read_random_int(nbits) 42 if rsa.prime.is_prime(integer): 52 >>> rsa.prime.is_prime(p-1) 54 >>> rsa.prime.is_prime(p) 56 >>> rsa.prime.is_prime(p+1) 59 >>> from rsa import common
|
prime.py | 25 import rsa.randnum namespace 95 x = rsa.randnum.randint(n-1) 122 >>> from rsa import common 129 integer = rsa.randnum.read_random_int(nbits)
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/tests/ |
test_integers.py | 5 import rsa.core namespace 10 (self.pub, self.priv) = rsa.newkeys(64) 17 encrypted = rsa.core.encrypt_int(message, self.pub.e, self.pub.n) 20 decrypted = rsa.core.decrypt_int(encrypted, self.priv.d, self.pub.n) 29 signed = rsa.core.encrypt_int(message,self.priv.d, self.pub.n) 32 verified = rsa.core.decrypt_int(signed, self.pub.e,self.pub.n)
|
test_strings.py | 7 import rsa namespace 14 (self.pub, self.priv) = rsa.newkeys(384) 21 encrypted = rsa.encrypt(message, self.pub) 24 decrypted = rsa.decrypt(encrypted, self.priv)
|
test_bigfile.py | 2 from rsa._compat import b 10 import rsa namespace 11 from rsa import bigfile, varblock, pkcs1 18 pub_key, priv_key = rsa.newkeys((6 + 11) * 8) 46 pub_key, priv_key = rsa.newkeys((34 + 11) * 8)
|
test_load_save_keys.py | 5 from rsa._compat import b 7 import rsa.key namespace 19 -----BEGIN RSA PRIVATE KEY----- 23 -----END RSA PRIVATE KEY----- 30 -----BEGIN RSA PRIVATE KEY----- 32 -----END RSA PRIVATE KEY----- 39 -----BEGIN RSA PUBLIC KEY----- 43 -----END RSA PUBLIC KEY----- 50 -----BEGIN RSA PUBLIC KEY----- 52 -----END RSA PUBLIC KEY---- [all...] |
test_varblock.py | 10 import rsa namespace 11 from rsa._compat import b 12 from rsa import varblock
|
test_pkcs1.py | 6 import rsa namespace 7 from rsa import pkcs1 8 from rsa._compat import byte, is_integer, b, is_bytes 13 (self.pub, self.priv) = rsa.newkeys(256) 56 (self.pub, self.priv) = rsa.newkeys(512) 79 (otherpub, _) = rsa.newkeys(512)
|
/libcore/ojluni/src/main/java/sun/security/rsa/ |
SunRsaSignEntries.java | 26 package sun.security.rsa; 45 map.put("KeyFactory.RSA", 46 "sun.security.rsa.RSAKeyFactory"); 47 map.put("KeyPairGenerator.RSA", 48 "sun.security.rsa.RSAKeyPairGenerator"); 50 "sun.security.rsa.RSASignature$MD2withRSA"); 52 "sun.security.rsa.RSASignature$MD5withRSA"); 54 "sun.security.rsa.RSASignature$SHA1withRSA"); 56 "sun.security.rsa.RSASignature$SHA256withRSA"); 58 "sun.security.rsa.RSASignature$SHA384withRSA") [all...] |
/external/ipsec-tools/src/racoon/ |
rsalist.h | 38 #include <openssl/rsa.h> 52 RSA *rsa; member in struct:rsa_key 55 int rsa_key_insert(struct genlist *list, struct netaddr *src, struct netaddr *dst, RSA *rsa); 59 RSA *rsa_try_check_rsasign(vchar_t *source, vchar_t *sig, struct genlist *list);
|
/bootable/recovery/ |
verifier.h | 24 #include <openssl/rsa.h> 28 void operator()(RSA* rsa) { 29 RSA_free(rsa); 47 std::unique_ptr<RSA, RSADeleter>&& rsa_, 51 rsa(std::move(rsa_)), 57 std::unique_ptr<RSA, RSADeleter> rsa; member in struct:Certificate
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/rsa/ |
RSAUtil.java | 1 package org.bouncycastle.jcajce.provider.asymmetric.rsa; 14 * utility class for converting java.security RSA objects into their
|
KeyFactorySpi.java | 1 package org.bouncycastle.jcajce.provider.asymmetric.rsa;
|
KeyPairGeneratorSpi.java | 1 package org.bouncycastle.jcajce.provider.asymmetric.rsa; 33 super("RSA");
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/oauth2client/tests/ |
test_service_account.py | 20 Unit tests for service account credentials implemented using RSA. 25 import rsa namespace 58 pub_key = rsa.PublicKey.load_pkcs1_openssl_pem( 61 self.assertTrue(rsa.pkcs1.verify(b'Google', signature, pub_key)) 64 rsa.pkcs1.verify(b'Orest', signature, pub_key) 66 except rsa.pkcs1.VerificationError: 70 rsa.pkcs1.verify(b'Google', b'bad signature', pub_key) 72 except rsa.pkcs1.VerificationError:
|
/external/curl/docs/examples/ |
usercertinmem.c | 23 /* Example using an in memory PEM user certificate and RSA key to retrieve an 50 RSA *rsa = NULL; local 96 /*replace the XXX with the actual RSA key*/ 98 "-----BEGIN RSA PRIVATE KEY-----\n"\ 115 "-----END RSA PRIVATE KEY-----\n"; 141 /*create a bio for the RSA key*/ 147 /*read the key bio into an RSA object*/ 148 rsa = PEM_read_bio_RSAPrivateKey(kbio, NULL, 0, NULL); 149 if(rsa == NULL) [all...] |
/external/google-tv-pairing-protocol/cpp/src/polo/util/ |
certificateutil.cc | 81 RSA* rsa = RSA_generate_key(1025, RSA_F4, NULL, NULL); local 82 EVP_PKEY_assign_RSA(pkey, rsa);
|
/external/google-tv-pairing-protocol/cpp/tests/polo/util/ |
certificateutiltest.cc | 56 std::string rsa_string = "-----BEGIN RSA PRIVATE KEY-----\n" 70 "-----END RSA PRIVATE KEY-----\n"; 73 RSA* rsa = PEM_read_bio_RSAPrivateKey(rsa_bio, NULL, NULL, NULL); local 76 EVP_PKEY_assign_RSA(pkey, rsa); 116 std::string pem = "-----BEGIN RSA PRIVATE KEY-----\n" 133 "-----END RSA PRIVATE KEY-----\n"; 139 RSA* rsa = EVP_PKEY_get1_RSA(pkey); local 140 ASSERT_TRUE(rsa); 148 RSA* rsa = RSA_generate_key(1025, RSA_F4, NULL, NULL); local [all...] |
/system/tpm/trunks/ |
session_manager_test.cc | 68 TPM2B_PUBLIC_KEY_RSA rsa; local 69 rsa.size = bytes.size(); 70 memcpy(rsa.buffer, bytes.data(), bytes.size()); 71 return rsa; 108 public_data.public_area.unique.rsa = GetValidRSAPublicKey(); 127 public_data.public_area.unique.rsa.size = 32; 138 public_data.public_area.unique.rsa = GetValidRSAPublicKey(); 154 public_data.public_area.unique.rsa = GetValidRSAPublicKey();
|
/system/update_engine/payload_consumer/ |
payload_verifier.cc | 34 // form a sequence of 256 bytes (2048 bits) that is amenable to RSA signing. The 148 RSA* rsa = PEM_read_RSA_PUBKEY(fpubkey, nullptr, nullptr, dummy_password); local 150 TEST_AND_RETURN_FALSE(rsa != nullptr); 151 unsigned int keysize = RSA_size(rsa); 154 RSA_free(rsa); 163 rsa, 165 RSA_free(rsa);
|