HomeSort by relevance Sort by last modified time
    Searched defs:rsa (Results 1 - 25 of 79) sorted by null

1 2 3 4

  /external/boringssl/src/decrepit/rsa/
rsa_decrepit.c 10 * apply to all code found in this distribution, be it the RC4, RSA,
57 #include <openssl/rsa.h>
64 RSA *RSA_generate_key(int bits, unsigned long e_value, void *callback,
69 RSA *rsa = RSA_new(); local
72 if (rsa == NULL ||
75 !RSA_generate_key_ex(rsa, bits, e, NULL)) {
80 return rsa;
84 RSA_free(rsa);
  /external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/
create_timing_table.py 4 import rsa namespace
17 rsa.newkeys(bitsize, accurate=accurate, poolsize=poolsize)
setup.py 5 import rsa namespace
7 setup(name='rsa',
8 version=rsa.__version__,
9 description='Pure-Python RSA implementation',
14 url='http://stuvel.eu/rsa',
15 packages=['rsa'],
32 'pyrsa-priv2pub = rsa.util:private_to_public',
33 'pyrsa-keygen = rsa.cli:keygen',
34 'pyrsa-encrypt = rsa.cli:encrypt',
35 'pyrsa-decrypt = rsa.cli:decrypt'
    [all...]
  /libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/func/
CipherRSATest.java 23 CipherRSAThread rsa = new CipherRSAThread("RSA", new int[] {512}, local
28 rsa.launcher();
30 assertEquals(rsa.getFailureMessages(), 0, rsa.getTotalFailuresNumber());
35 CipherRSAThread rsa = new CipherRSAThread("RSA", new int[] {1024}, local
40 rsa.launcher();
42 assertEquals(rsa.getFailureMessages(), 0, rsa.getTotalFailuresNumber())
47 CipherRSAThread rsa = new CipherRSAThread("RSA", new int[] {2048}, local
57 CipherRSAThread rsa = new CipherRSAThread("RSA", new int[] {1024}, local
    [all...]
  /external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/rsa/
util.py 24 import rsa.key namespace
65 priv_key = rsa.key.PrivateKey.load_pkcs1(in_data, cli.inform)
66 pub_key = rsa.key.PublicKey(priv_key.n, priv_key.e)
parallel.py 19 Introduced in Python-RSA 3.1.
31 import rsa.prime namespace
32 import rsa.randnum namespace
36 integer = rsa.randnum.read_random_int(nbits)
42 if rsa.prime.is_prime(integer):
52 >>> rsa.prime.is_prime(p-1)
54 >>> rsa.prime.is_prime(p)
56 >>> rsa.prime.is_prime(p+1)
59 >>> from rsa import common
prime.py 25 import rsa.randnum namespace
95 x = rsa.randnum.randint(n-1)
122 >>> from rsa import common
129 integer = rsa.randnum.read_random_int(nbits)
  /external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/tests/
test_integers.py 5 import rsa.core namespace
10 (self.pub, self.priv) = rsa.newkeys(64)
17 encrypted = rsa.core.encrypt_int(message, self.pub.e, self.pub.n)
20 decrypted = rsa.core.decrypt_int(encrypted, self.priv.d, self.pub.n)
29 signed = rsa.core.encrypt_int(message,self.priv.d, self.pub.n)
32 verified = rsa.core.decrypt_int(signed, self.pub.e,self.pub.n)
test_strings.py 7 import rsa namespace
14 (self.pub, self.priv) = rsa.newkeys(384)
21 encrypted = rsa.encrypt(message, self.pub)
24 decrypted = rsa.decrypt(encrypted, self.priv)
test_bigfile.py 2 from rsa._compat import b
10 import rsa namespace
11 from rsa import bigfile, varblock, pkcs1
18 pub_key, priv_key = rsa.newkeys((6 + 11) * 8)
46 pub_key, priv_key = rsa.newkeys((34 + 11) * 8)
test_load_save_keys.py 5 from rsa._compat import b
7 import rsa.key namespace
19 -----BEGIN RSA PRIVATE KEY-----
23 -----END RSA PRIVATE KEY-----
30 -----BEGIN RSA PRIVATE KEY-----
32 -----END RSA PRIVATE KEY-----
39 -----BEGIN RSA PUBLIC KEY-----
43 -----END RSA PUBLIC KEY-----
50 -----BEGIN RSA PUBLIC KEY-----
52 -----END RSA PUBLIC KEY----
    [all...]
test_varblock.py 10 import rsa namespace
11 from rsa._compat import b
12 from rsa import varblock
test_pkcs1.py 6 import rsa namespace
7 from rsa import pkcs1
8 from rsa._compat import byte, is_integer, b, is_bytes
13 (self.pub, self.priv) = rsa.newkeys(256)
56 (self.pub, self.priv) = rsa.newkeys(512)
79 (otherpub, _) = rsa.newkeys(512)
  /libcore/ojluni/src/main/java/sun/security/rsa/
SunRsaSignEntries.java 26 package sun.security.rsa;
45 map.put("KeyFactory.RSA",
46 "sun.security.rsa.RSAKeyFactory");
47 map.put("KeyPairGenerator.RSA",
48 "sun.security.rsa.RSAKeyPairGenerator");
50 "sun.security.rsa.RSASignature$MD2withRSA");
52 "sun.security.rsa.RSASignature$MD5withRSA");
54 "sun.security.rsa.RSASignature$SHA1withRSA");
56 "sun.security.rsa.RSASignature$SHA256withRSA");
58 "sun.security.rsa.RSASignature$SHA384withRSA")
    [all...]
  /external/ipsec-tools/src/racoon/
rsalist.h 38 #include <openssl/rsa.h>
52 RSA *rsa; member in struct:rsa_key
55 int rsa_key_insert(struct genlist *list, struct netaddr *src, struct netaddr *dst, RSA *rsa);
59 RSA *rsa_try_check_rsasign(vchar_t *source, vchar_t *sig, struct genlist *list);
  /bootable/recovery/
verifier.h 24 #include <openssl/rsa.h>
28 void operator()(RSA* rsa) {
29 RSA_free(rsa);
47 std::unique_ptr<RSA, RSADeleter>&& rsa_,
51 rsa(std::move(rsa_)),
57 std::unique_ptr<RSA, RSADeleter> rsa; member in struct:Certificate
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/rsa/
RSAUtil.java 1 package org.bouncycastle.jcajce.provider.asymmetric.rsa;
14 * utility class for converting java.security RSA objects into their
KeyFactorySpi.java 1 package org.bouncycastle.jcajce.provider.asymmetric.rsa;
KeyPairGeneratorSpi.java 1 package org.bouncycastle.jcajce.provider.asymmetric.rsa;
33 super("RSA");
  /external/chromium-trace/catapult/third_party/gsutil/third_party/oauth2client/tests/
test_service_account.py 20 Unit tests for service account credentials implemented using RSA.
25 import rsa namespace
58 pub_key = rsa.PublicKey.load_pkcs1_openssl_pem(
61 self.assertTrue(rsa.pkcs1.verify(b'Google', signature, pub_key))
64 rsa.pkcs1.verify(b'Orest', signature, pub_key)
66 except rsa.pkcs1.VerificationError:
70 rsa.pkcs1.verify(b'Google', b'bad signature', pub_key)
72 except rsa.pkcs1.VerificationError:
  /external/curl/docs/examples/
usercertinmem.c 23 /* Example using an in memory PEM user certificate and RSA key to retrieve an
50 RSA *rsa = NULL; local
96 /*replace the XXX with the actual RSA key*/
98 "-----BEGIN RSA PRIVATE KEY-----\n"\
115 "-----END RSA PRIVATE KEY-----\n";
141 /*create a bio for the RSA key*/
147 /*read the key bio into an RSA object*/
148 rsa = PEM_read_bio_RSAPrivateKey(kbio, NULL, 0, NULL);
149 if(rsa == NULL)
    [all...]
  /external/google-tv-pairing-protocol/cpp/src/polo/util/
certificateutil.cc 81 RSA* rsa = RSA_generate_key(1025, RSA_F4, NULL, NULL); local
82 EVP_PKEY_assign_RSA(pkey, rsa);
  /external/google-tv-pairing-protocol/cpp/tests/polo/util/
certificateutiltest.cc 56 std::string rsa_string = "-----BEGIN RSA PRIVATE KEY-----\n"
70 "-----END RSA PRIVATE KEY-----\n";
73 RSA* rsa = PEM_read_bio_RSAPrivateKey(rsa_bio, NULL, NULL, NULL); local
76 EVP_PKEY_assign_RSA(pkey, rsa);
116 std::string pem = "-----BEGIN RSA PRIVATE KEY-----\n"
133 "-----END RSA PRIVATE KEY-----\n";
139 RSA* rsa = EVP_PKEY_get1_RSA(pkey); local
140 ASSERT_TRUE(rsa);
148 RSA* rsa = RSA_generate_key(1025, RSA_F4, NULL, NULL); local
    [all...]
  /system/tpm/trunks/
session_manager_test.cc 68 TPM2B_PUBLIC_KEY_RSA rsa; local
69 rsa.size = bytes.size();
70 memcpy(rsa.buffer, bytes.data(), bytes.size());
71 return rsa;
108 public_data.public_area.unique.rsa = GetValidRSAPublicKey();
127 public_data.public_area.unique.rsa.size = 32;
138 public_data.public_area.unique.rsa = GetValidRSAPublicKey();
154 public_data.public_area.unique.rsa = GetValidRSAPublicKey();
  /system/update_engine/payload_consumer/
payload_verifier.cc 34 // form a sequence of 256 bytes (2048 bits) that is amenable to RSA signing. The
148 RSA* rsa = PEM_read_RSA_PUBKEY(fpubkey, nullptr, nullptr, dummy_password); local
150 TEST_AND_RETURN_FALSE(rsa != nullptr);
151 unsigned int keysize = RSA_size(rsa);
154 RSA_free(rsa);
163 rsa,
165 RSA_free(rsa);

Completed in 287 milliseconds

1 2 3 4