/external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/rsa/ |
H A D | bigfile.py | 45 def encrypt_bigfile(infile, outfile, pub_key): 50 :param pub_key: :py:class:`rsa.PublicKey` to encrypt with 54 if not isinstance(pub_key, key.PublicKey): 55 raise TypeError('Public key required, but got %r' % pub_key) 57 key_bytes = common.bit_size(pub_key.n) // 8 65 crypto = pkcs1.encrypt(block, pub_key)
|
H A D | pkcs1.py | 143 def encrypt(message, pub_key): 149 :param pub_key: the :py:class:`rsa.PublicKey` to encrypt with. 154 >>> (pub_key, priv_key) = key.newkeys(256) 156 >>> crypto = encrypt(message, pub_key) 160 >>> len(crypto) == common.byte_size(pub_key.n) 165 keylength = common.byte_size(pub_key.n) 169 encrypted = core.encrypt_int(payload, pub_key.e, pub_key.n) 189 >>> (pub_key, priv_key) = rsa.newkeys(256) 193 >>> crypto = encrypt('hello', pub_key) [all...] |
H A D | util.py | 66 pub_key = rsa.key.PublicKey(priv_key.n, priv_key.e) 69 out_data = pub_key.save_pkcs1(cli.outform)
|
H A D | cli.py | 68 (pub_key, priv_key) = rsa.newkeys(keysize) 74 data = pub_key.save_pkcs1(format=cli.form) 207 def perform_operation(self, indata, pub_key, cli_args=None): 210 return rsa.encrypt(indata, pub_key) 269 def perform_operation(self, indata, pub_key, cli_args): 278 rsa.verify(indata, signature, pub_key) 351 def perform_operation(self, infile, outfile, pub_key, cli_args=None): 354 return rsa.bigfile.encrypt_bigfile(infile, outfile, pub_key)
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/tests/ |
H A D | test_bigfile.py | 18 pub_key, priv_key = rsa.newkeys((6 + 11) * 8) 25 bigfile.encrypt_bigfile(infile, outfile, pub_key) 46 pub_key, priv_key = rsa.newkeys((34 + 11) * 8) 54 self.assertTrue(pkcs1.verify(msgfile, signature, pub_key)) 59 pkcs1.verify, msgfile, signature, pub_key)
|
/external/chromium-trace/catapult/telemetry/telemetry/internal/backends/chrome/ |
H A D | crx_id.py | 108 pub_key = '' 112 pub_key = GetPublicKeyUnpacked(f, filename) 117 pub_key = GetPublicKeyPacked(f) 119 return pub_key 122 pub_key = GetPublicKey(filename, from_file_path, is_win_path=is_win_path) 123 pub_key_hash = hashlib.sha256(pub_key).digest() 127 pub_key = GetPublicKey(filename, from_file_path, is_win_path=is_win_path) 128 pub_key_hash = hashlib.sha256(pub_key).digest()
|
/external/vboot_reference/scripts/image_signing/ |
H A D | insert_au_publickey.sh | 16 local pub_key="$2" 28 sudo cp "$pub_key" "$rootfs/$key_location/update-payload-key.pub.pem"
|
/external/boringssl/include/openssl/ |
H A D | ecdh.h | 82 /* ECDH_compute_key calculates the shared key between |pub_key| and |priv_key|. 89 const EC_POINT *pub_key, EC_KEY *priv_key,
|
H A D | dh.h | 162 /* DH_check_pub_key checks the suitability of |pub_key| as a public key for the 166 OPENSSL_EXPORT int DH_check_pub_key(const DH *dh, const BIGNUM *pub_key, 206 BIGNUM *pub_key; /* g^x mod p */ member in struct:dh_st
|
/external/boringssl/src/include/openssl/ |
H A D | ecdh.h | 82 /* ECDH_compute_key calculates the shared key between |pub_key| and |priv_key|. 89 const EC_POINT *pub_key, EC_KEY *priv_key,
|
H A D | dh.h | 162 /* DH_check_pub_key checks the suitability of |pub_key| as a public key for the 166 OPENSSL_EXPORT int DH_check_pub_key(const DH *dh, const BIGNUM *pub_key, 206 BIGNUM *pub_key; /* g^x mod p */ member in struct:dh_st
|
/external/boringssl/src/crypto/ec/ |
H A D | ec_key.c | 152 EC_POINT_free(r->pub_key); 177 if (src->pub_key && src->group) { 178 EC_POINT_free(dest->pub_key); 179 dest->pub_key = EC_POINT_dup(src->pub_key, src->group); 180 if (dest->pub_key == NULL) { 274 return key->pub_key; 277 int EC_KEY_set_public_key(EC_KEY *key, const EC_POINT *pub_key) { argument 278 EC_POINT_free(key->pub_key); 279 key->pub_key 412 EC_POINT *pub_key = NULL; local [all...] |
H A D | ec_asn1.c | 337 EC_POINT_free(ret->pub_key); 338 ret->pub_key = EC_POINT_new(ret->group); 339 if (ret->pub_key == NULL) { 357 if (!EC_POINT_oct2point(ret->group, ret->pub_key, pub_oct, pub_oct_len, 363 if (!EC_POINT_mul(ret->group, ret->pub_key, ret->priv_key, NULL, NULL, 437 if (!(key->enc_flag & EC_PKEY_NO_PUBKEY) && key->pub_key != NULL) { 444 tmp_len = EC_POINT_point2oct(key->group, key->pub_key, key->conv_form, NULL, 457 if (!EC_POINT_point2oct(key->group, key->pub_key, key->conv_form, buffer, 532 if (ret->pub_key == NULL && 533 (ret->pub_key [all...] |
H A D | ec_test.cc | 109 const EC_POINT *pub_key = EC_KEY_get0_public_key(key.get()); local 110 if (pub_key == NULL) { 121 pub_key, x.get(), y.get(), NULL)) {
|
H A D | ec_montgomery.c | 243 const EC_POINT* pub_key, 249 !ec_wNAF_mul(group, point, NULL, pub_key, EC_GROUP_get0_order(group), 242 ec_GFp_mont_check_pub_key_order(const EC_GROUP *group, const EC_POINT* pub_key, BN_CTX *ctx) argument
|
H A D | internal.h | 107 * by checking that |pub_key*group->order| is the point at infinity. This may 112 int (*check_pub_key_order)(const EC_GROUP *group, const EC_POINT *pub_key, 275 EC_POINT *pub_key; member in struct:ec_key_st
|
/external/boringssl/src/crypto/dh/ |
H A D | dh.c | 111 BN_clear_free(dh->pub_key); 240 BIGNUM *pub_key = NULL, *priv_key = NULL; local 263 if (dh->pub_key == NULL) { 264 pub_key = BN_new(); 265 if (pub_key == NULL) { 269 pub_key = dh->pub_key; 296 if (!BN_mod_exp_mont(pub_key, dh->g, &local_priv, dh->p, ctx, mont)) { 300 dh->pub_key = pub_key; [all...] |
H A D | check.c | 64 int DH_check_pub_key(const DH *dh, const BIGNUM *pub_key, int *ret) { argument 74 if (BN_cmp(pub_key, &q) <= 0) { 81 if (BN_cmp(pub_key, &q) >= 0) {
|
/external/boringssl/src/crypto/evp/ |
H A D | p_dsa_asn1.c | 114 dsa->pub_key = ASN1_INTEGER_to_BN(public_key, NULL); 115 if (dsa->pub_key == NULL) { 215 dsa->pub_key = BN_new(); 216 if (dsa->pub_key == NULL) { 226 if (!BN_mod_exp(dsa->pub_key, dsa->g, dsa->priv_key, dsa->p, ctx)) { 345 return BN_cmp(b->pkey.dsa->pub_key, a->pkey.dsa->pub_key) == 0; 368 const BIGNUM *priv_key, *pub_key; local 375 pub_key = NULL; 377 pub_key [all...] |
H A D | p_ec_asn1.c | 243 EC_POINT *pub_key; local 247 pub_key = EC_POINT_new(group); 248 if (pub_key == NULL) { 252 if (!EC_POINT_copy(pub_key, EC_GROUP_get0_generator(group))) { 253 EC_POINT_free(pub_key); 258 if (!EC_POINT_mul(group, pub_key, priv_key, NULL, NULL, NULL)) { 259 EC_POINT_free(pub_key); 263 if (EC_KEY_set_public_key(eckey, pub_key) == 0) { 264 EC_POINT_free(pub_key); 268 EC_POINT_free(pub_key); [all...] |
/external/boringssl/src/crypto/dsa/ |
H A D | dsa_asn1.c | 117 ASN1_SIMPLE(DSA, pub_key, BIGNUM), 135 ASN1_SIMPLE(DSA, pub_key, BIGNUM), 142 ASN1_SIMPLE(DSA, pub_key, BIGNUM),
|
H A D | dsa.c | 120 BN_clear_free(dsa->pub_key); 399 BIGNUM *pub_key = NULL, *priv_key = NULL; local 421 pub_key = dsa->pub_key; 422 if (pub_key == NULL) { 423 pub_key = BN_new(); 424 if (pub_key == NULL) { 432 if (!BN_mod_exp(pub_key, dsa->g, &prk, dsa->p, ctx)) { 437 dsa->pub_key = pub_key; [all...] |
/external/chromium-trace/catapult/third_party/gsutil/third_party/oauth2client/tests/ |
H A D | test_service_account.py | 58 pub_key = rsa.PublicKey.load_pkcs1_openssl_pem( 61 self.assertTrue(rsa.pkcs1.verify(b'Google', signature, pub_key)) 64 rsa.pkcs1.verify(b'Orest', signature, pub_key) 70 rsa.pkcs1.verify(b'Google', b'bad signature', pub_key)
|
/external/boringssl/src/crypto/ecdh/ |
H A D | ecdh.c | 77 int ECDH_compute_key(void *out, size_t outlen, const EC_POINT *pub_key, argument 104 if (!EC_POINT_mul(group, tmp, NULL, pub_key, priv, ctx)) {
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/netscape/ |
H A D | NetscapeCertRequest.java | 131 PublicKey pub_key) throws NoSuchAlgorithmException, 137 pubkey = pub_key; 128 NetscapeCertRequest( String challenge, AlgorithmIdentifier signing_alg, PublicKey pub_key) argument
|