/dports/lang/mono/mono-5.10.1.57/mcs/class/System.Security/Test/System.Security.Cryptography.Xml/ |
H A D | RSAKeyValueTest.cs | 26 RSAKeyValue rsa1 = new RSAKeyValue (); in GeneratedKey() 27 Assert.IsNotNull (rsa1.Key, "Key"); in GeneratedKey() 28 XmlElement xmlkey = rsa1.GetXml (); in GeneratedKey() 33 Assert.IsTrue ((rsa1.GetXml ().OuterXml) == (rsa2.GetXml ().OuterXml), "rsa1==rsa2"); in GeneratedKey() 35 RSA key = rsa1.Key; in GeneratedKey() 37 Assert.IsTrue ((rsa3.GetXml ().OuterXml) == (rsa1.GetXml ().OuterXml), "rsa3==rsa1"); in GeneratedKey() 48 RSAKeyValue rsa1 = new RSAKeyValue (); in ImportKey() 49 rsa1.LoadXml (doc.DocumentElement); in ImportKey() 51 string s = (rsa1.GetXml ().OuterXml); in ImportKey()
|
/dports/devel/qca/qca-2.3.4/unittest/keygenunittest/ |
H A D | keygenunittest.cpp | 69 QCA::RSAPrivateKey rsa1 = priv1.toRSA(); in testRSA() local 70 QCOMPARE(rsa1.isNull(), false); in testRSA() 72 QCOMPARE(rsa1.bitSize(), 1024); in testRSA() 75 rsa1 = priv1.toRSA(); in testRSA() 76 QCOMPARE(rsa1.isNull(), false); in testRSA() 77 QCOMPARE(rsa1.e(), QCA::BigInteger(17)); in testRSA() 78 QCOMPARE(rsa1.bitSize(), 512); in testRSA() 81 rsa1 = priv1.toRSA(); in testRSA() 82 QCOMPARE(rsa1.isNull(), false); in testRSA() 83 QCOMPARE(rsa1.e(), QCA::BigInteger(3)); in testRSA() [all …]
|
/dports/security/arti/arti-9d0ede26801cdb182daa85c3eb5f0058dc178eb6/crates/tor-netdoc/src/doc/authcert/ |
H A D | build.rs | 137 fn rsa1() -> rsa::PublicKey { in rsa1() function 155 .signing_key(rsa1()) in simple_cert() 162 assert_eq!(cert.key_ids().sk_fingerprint, rsa1().to_rsa_identity()); in simple_cert() 175 .identity_key(rsa1()) in failing_cert() 183 .signing_key(rsa1()) in failing_cert() 191 .signing_key(rsa1()) in failing_cert() 199 .signing_key(rsa1()) in failing_cert()
|
/dports/lang/mono/mono-5.10.1.57/external/corefx/src/System.Security.Cryptography.Xml/tests/ |
H A D | RSAKeyValueTest.cs | 77 RSAKeyValue rsa1 = new RSAKeyValue(); in LoadXml_LoadXml_GetXml() 78 rsa1.LoadXml(doc.DocumentElement); in LoadXml_LoadXml_GetXml() 80 string s = rsa1.GetXml().OuterXml; in LoadXml_LoadXml_GetXml() 92 RSAKeyValue rsa1 = new RSAKeyValue(); in LoadXml_GetXml_With_NS_Prefix() 93 rsa1.LoadXml(doc.DocumentElement); in LoadXml_GetXml_With_NS_Prefix() 95 string s = rsa1.GetXml().OuterXml; in LoadXml_GetXml_With_NS_Prefix()
|
/dports/lang/mono/mono-5.10.1.57/mcs/class/Mono.Security/Test/Mono.Security.Authenticode/ |
H A D | PrivateKeyTest.cs | 168 string rsa1 = pvk.RSA.ToXmlString (true); in ConvertToPasswordWeak() 173 Assert.AreEqual (rsa1, rsa2, "topwd.RSA identical"); in ConvertToPasswordWeak() 185 string rsa1 = pvk.RSA.ToXmlString (true); in ConvertToPasswordStrong() 191 Assert.AreEqual (rsa1, rsa2, "topwd.RSA identical"); in ConvertToPasswordStrong() 244 string rsa1 = pvk.RSA.ToXmlString (true); in RemovePassword() 249 Assert.AreEqual (rsa1, rsa2, "nomorepwd.RSA identical"); in RemovePassword() 260 string rsa1 = pvk.RSA.ToXmlString (true); in CreatePVK() 266 Assert.AreEqual (rsa1, rsa2, "new.RSA identical"); in CreatePVK()
|
/dports/devel/xmltooling/xmltooling-3.2.1/xmltooling/security/impl/ |
H A D | OpenSSLSecurityHelper.cpp | 52 const RSA* rsa1 = static_cast<const OpenSSLCryptoKeyRSA&>(key).getOpenSSLRSA(); in matchesPublic() local 53 …return (rsa1 && rsa && BN_cmp(xmltooling::RSA_get0_n(rsa1), xmltooling::RSA_get0_n(rsa)) == 0 && B… in matchesPublic()
|
/dports/security/p5-Crypt-Perl/Crypt-Perl-0.34/t/ |
H A D | Crypt-Perl-X509v3.t | 57 my $rsa1 = <<END; 123 [ 'self-sign - RSA', $rsa1, $rsa1 ], 124 [ 'two RSAs', $rsa1, $rsa2 ], 131 [ 'subject RSA, signer ECC', $rsa1, $p256_1 ], 132 [ 'subject ECC, signer RSA', $p256_1, $rsa1 ], 142 [ 'subject RSA, signer Ed25519', $rsa1, $ed25519_1 ], 143 [ 'subject Ed25519, signer RSA', $ed25519_1, $rsa1 ],
|
/dports/math/vtk6/VTK-6.2.0/ThirdParty/Twisted/twisted/conch/test/ |
H A D | test_keys.py | 436 rsa1 = keys.Key(self.rsaObj) 440 self.assertTrue(rsa1 == rsa2) 441 self.assertFalse(rsa1 == rsa3) 442 self.assertFalse(rsa1 == dsa) 444 self.assertFalse(rsa1 == None) 450 rsa1 = keys.Key(self.rsaObj) 454 self.assertFalse(rsa1 != rsa2) 455 self.assertTrue(rsa1 != rsa3) 456 self.assertTrue(rsa1 != dsa) 457 self.assertTrue(rsa1 != object) [all …]
|
/dports/security/gnome-ssh-askpass/openssh-6.6p1/regress/ |
H A D | Makefile | 80 rsa.pub rsa rsa1.pub rsa1 host.rsa host.rsa1 \ 81 rsa-agent rsa-agent.pub rsa1-agent rsa1-agent.pub \
|
H A D | forcecommand.sh | 11 cat $OBJ/rsa1.pub >> $OBJ/authorized_keys_$USER 22 cat $OBJ/rsa1.pub >> $OBJ/authorized_keys_$USER
|
H A D | keyscan.sh | 11 for t in rsa1 rsa dsa; do
|
H A D | keygen-change.sh | 9 for t in rsa dsa rsa1; do
|
H A D | agent-timeout.sh | 15 for t in rsa rsa1; do
|
/dports/lang/mono/mono-5.10.1.57/mcs/class/corlib/Test/System.Security.Cryptography/ |
H A D | RSACryptoServiceProviderTest.cs | 1009 RSACryptoServiceProvider rsa1 = new RSACryptoServiceProvider (minKeySize, csp); in Persistence_PersistKeyInCsp_False() 1011 string first = rsa1.ToXmlString (true); in Persistence_PersistKeyInCsp_False() 1014 Assert.IsTrue (rsa1.PersistKeyInCsp, "PersistKeyInCsp"); in Persistence_PersistKeyInCsp_False() 1017 rsa1.PersistKeyInCsp = false; in Persistence_PersistKeyInCsp_False() 1018 Assert.IsFalse (rsa1.PersistKeyInCsp, "PersistKeyInCsp"); in Persistence_PersistKeyInCsp_False() 1033 RSACryptoServiceProvider rsa1 = new RSACryptoServiceProvider (minKeySize, csp); in Persistence_PersistKeyInCsp_True() 1035 string first = rsa1.ToXmlString (true); in Persistence_PersistKeyInCsp_True() 1038 Assert.IsTrue (rsa1.PersistKeyInCsp, "PersistKeyInCsp"); in Persistence_PersistKeyInCsp_True() 1055 string original = rsa1.ToXmlString (true); in Persistence_Delete() 1059 rsa1.PersistKeyInCsp = false; in Persistence_Delete() [all …]
|
/dports/devel/qca/qca-2.3.4/plugins/qca-test/ |
H A D | qca-test.cpp | 414 TestRSAContext *rsa1 = new TestRSAContext(provider()); in subjectPublicKey() local 415 rsa1->priv = false; in subjectPublicKey() 417 kc1->setKey(rsa1); in subjectPublicKey() 563 TestRSAContext * rsa1 = new TestRSAContext(provider()); in TestKeyStoreListContext() local 565 kc1->setKey(rsa1); in TestKeyStoreListContext() 582 rsa1->store = &data.stores[0]; in TestKeyStoreListContext()
|
/dports/lang/mono/mono-5.10.1.57/mcs/class/referencesource/System.IdentityModel/System/IdentityModel/Claims/ |
H A D | ClaimComparer.cs | 224 RSA rsa1 = obj1 as RSA; in IEqualityComparer.Equals() 226 if (rsa1 == null || rsa2 == null) in IEqualityComparer.Equals() 229 RSAParameters parm1 = rsa1.ExportParameters(false); in IEqualityComparer.Equals()
|
/dports/devel/py-twisted/Twisted-22.1.0/src/twisted/conch/test/ |
H A D | test_keys.py | 666 rsa1 = keys.Key(self.rsaObj) 670 self.assertTrue(rsa1 == rsa2) 671 self.assertFalse(rsa1 == rsa3) 672 self.assertFalse(rsa1 == dsa) 674 self.assertFalse(rsa1 == None) 680 rsa1 = keys.Key(self.rsaObj) 684 self.assertFalse(rsa1 != rsa2) 685 self.assertTrue(rsa1 != rsa3) 686 self.assertTrue(rsa1 != dsa) 687 self.assertTrue(rsa1 != object) [all …]
|
/dports/dns/bind-tools/bind-9.16.27/lib/dns/ |
H A D | opensslrsa_link.c | 365 RSA *rsa1 = NULL, *rsa2 = NULL; in opensslrsa_compare() local 380 rsa1 = EVP_PKEY_get1_RSA(pkey1); in opensslrsa_compare() 381 RSA_free(rsa1); in opensslrsa_compare() 388 if (rsa1 == NULL && rsa2 == NULL) { in opensslrsa_compare() 390 } else if (rsa1 == NULL || rsa2 == NULL) { in opensslrsa_compare() 394 RSA_get0_key(rsa1, &n1, &e1, &d1); in opensslrsa_compare() 402 if (RSA_test_flags(rsa1, RSA_FLAG_EXT_PKEY) != 0 || in opensslrsa_compare() 405 if (RSA_test_flags(rsa1, RSA_FLAG_EXT_PKEY) == 0 || in opensslrsa_compare() 420 RSA_get0_factors(rsa1, &p1, &q1); in opensslrsa_compare()
|
/dports/dns/bind916/bind-9.16.27/lib/dns/ |
H A D | opensslrsa_link.c | 365 RSA *rsa1 = NULL, *rsa2 = NULL; in opensslrsa_compare() local 380 rsa1 = EVP_PKEY_get1_RSA(pkey1); in opensslrsa_compare() 381 RSA_free(rsa1); in opensslrsa_compare() 388 if (rsa1 == NULL && rsa2 == NULL) { in opensslrsa_compare() 390 } else if (rsa1 == NULL || rsa2 == NULL) { in opensslrsa_compare() 394 RSA_get0_key(rsa1, &n1, &e1, &d1); in opensslrsa_compare() 402 if (RSA_test_flags(rsa1, RSA_FLAG_EXT_PKEY) != 0 || in opensslrsa_compare() 405 if (RSA_test_flags(rsa1, RSA_FLAG_EXT_PKEY) == 0 || in opensslrsa_compare() 420 RSA_get0_factors(rsa1, &p1, &q1); in opensslrsa_compare()
|
/dports/dns/samba-nsupdate/bind-9.16.5/lib/dns/ |
H A D | opensslrsa_link.c | 363 RSA *rsa1 = NULL, *rsa2 = NULL; in opensslrsa_compare() local 378 rsa1 = EVP_PKEY_get1_RSA(pkey1); in opensslrsa_compare() 379 RSA_free(rsa1); in opensslrsa_compare() 386 if (rsa1 == NULL && rsa2 == NULL) { in opensslrsa_compare() 388 } else if (rsa1 == NULL || rsa2 == NULL) { in opensslrsa_compare() 392 RSA_get0_key(rsa1, &n1, &e1, &d1); in opensslrsa_compare() 400 if (RSA_test_flags(rsa1, RSA_FLAG_EXT_PKEY) != 0 || in opensslrsa_compare() 403 if (RSA_test_flags(rsa1, RSA_FLAG_EXT_PKEY) == 0 || in opensslrsa_compare() 418 RSA_get0_factors(rsa1, &p1, &q1); in opensslrsa_compare()
|
/dports/dns/bind9-devel/bind9-e112afa15668bd3b1baed59df2d21e01b46da15e/lib/dns/ |
H A D | opensslrsa_link.c | 352 RSA *rsa1 = NULL, *rsa2 = NULL; in opensslrsa_compare() local 367 rsa1 = EVP_PKEY_get1_RSA(pkey1); in opensslrsa_compare() 368 RSA_free(rsa1); in opensslrsa_compare() 375 if (rsa1 == NULL && rsa2 == NULL) { in opensslrsa_compare() 377 } else if (rsa1 == NULL || rsa2 == NULL) { in opensslrsa_compare() 381 RSA_get0_key(rsa1, &n1, &e1, &d1); in opensslrsa_compare() 389 if (RSA_test_flags(rsa1, RSA_FLAG_EXT_PKEY) != 0 || in opensslrsa_compare() 392 if (RSA_test_flags(rsa1, RSA_FLAG_EXT_PKEY) == 0 || in opensslrsa_compare() 407 RSA_get0_factors(rsa1, &p1, &q1); in opensslrsa_compare()
|
/dports/net/p5-Net-SSH-Perl/Net-SSH-Perl-2.14/eg/ |
H A D | pssh-keygen | 286 values are C<'rsa1'> for protocol version 1, C<'dsa'> for 288 2 RSA files. The default is C<'rsa1'>.
|
/dports/security/gnome-ssh-askpass/openssh-6.6p1/contrib/caldera/ |
H A D | ssh-host-keygen | 19 $keygen -t rsa1 -f $keydir/ssh_host_key -C '' -N ''
|
/dports/sysutils/perp/perp-2.07/examples/sshd/ |
H A D | rc.main | 16 /usr/bin/ssh-keygen -t rsa1 -f /etc/ssh/ssh_host_key -N ''
|
/dports/dns/bind911/bind-9.11.37/lib/dns/ |
H A D | opensslrsa_link.c | 906 RSA *rsa1 = NULL, *rsa2 = NULL; in opensslrsa_compare() local 924 rsa1 = EVP_PKEY_get1_RSA(pkey1); in opensslrsa_compare() 925 RSA_free(rsa1); in opensslrsa_compare() 932 rsa1 = key1->keydata.rsa; in opensslrsa_compare() 936 if (rsa1 == NULL && rsa2 == NULL) in opensslrsa_compare() 938 else if (rsa1 == NULL || rsa2 == NULL) in opensslrsa_compare() 941 RSA_get0_key(rsa1, &n1, &e1, &d1); in opensslrsa_compare() 949 if (RSA_test_flags(rsa1, RSA_FLAG_EXT_PKEY) != 0 || in opensslrsa_compare() 951 if (RSA_test_flags(rsa1, RSA_FLAG_EXT_PKEY) == 0 || in opensslrsa_compare() 964 RSA_get0_factors(rsa1, &p1, &q1); in opensslrsa_compare()
|