/external/openssh/regress/unittests/sshkey/ |
D | mktestdata.sh | 80 ssh-keygen -t rsa -b 1024 -C "RSA test key #1" -N "" -f rsa_1 -m PEM 81 ssh-keygen -t dsa -b 1024 -C "DSA test key #1" -N "" -f dsa_1 -m PEM 82 ssh-keygen -t ecdsa -b 256 -C "ECDSA test key #1" -N "" -f ecdsa_1 -m PEM 83 ssh-keygen -t ed25519 -C "ED25519 test key #1" -N "" -f ed25519_1 85 ssh-keygen -t rsa -b 2048 -C "RSA test key #2" -N "" -f rsa_2 -m PEM 86 ssh-keygen -t dsa -b 1024 -C "DSA test key #2" -N "" -f dsa_2 -m PEM 87 ssh-keygen -t ecdsa -b 521 -C "ECDSA test key #2" -N "" -f ecdsa_2 -m PEM 88 ssh-keygen -t ed25519 -C "ED25519 test key #1" -N "" -f ed25519_2 94 ssh-keygen -pf rsa_n -N "" 95 ssh-keygen -pf dsa_n -N "" [all …]
|
/external/openssh/regress/unittests/hostkeys/ |
D | mktestdata.sh | 16 ssh-keygen -qt rsa -b 1024 -C "RSA #$_n" -N "" -f rsa_$_n 17 ssh-keygen -qt dsa -b 1024 -C "DSA #$_n" -N "" -f dsa_$_n 18 ssh-keygen -qt ecdsa -b $_ecdsa_bits -C "ECDSA #$_n" -N "" -f ecdsa_$_n 19 ssh-keygen -qt ed25519 -C "ED25519 #$_n" -N "" -f ed25519_$_n 46 ssh-keygen -Hf known_hosts_hash_frag
|
/external/openssh/regress/ |
D | ssh-com-keygen.sh | 37 keygen=${TEST_COMBASE}/${v}/ssh-keygen2 38 if [ ! -x ${keygen} ]; then 50 ${keygen} -q -P -t $t ${COMPRV} > /dev/null 2>&1 52 fail "${keygen} -t $t failed"
|
D | Makefile | 45 keygen-change \ 46 keygen-convert \ 47 keygen-moduli \ 86 keygen-knownhosts \ 95 keygen-comment 136 TEST_SSH_SSHKEYGEN?=ssh-keygen
|
D | README.regress | 89 keygen-change.sh: change passphrase for key 90 keygen-convert.sh: convert keys 91 keygen-moduli.sh: keygen moduli 104 ssh-com-keygen.sh: ssh.com key import 133 keygen-knownhosts.sh: ssh-keygen known_hosts
|
D | dsa_ssh2.prv | 2 Subject: ssh-keygen test
|
D | dsa_ssh2.pub | 2 Subject: ssh-keygen test
|
D | rsa_ssh2.prv | 2 Subject: ssh-keygen test
|
D | krl.sh | 64 keygen() { function 89 f=`keygen $n` 96 f=`keygen $n`
|
/external/ukey2/src/main/java/com/google/security/cryptauth/lib/securemessage/ |
D | PublicKeyProtoUtil.java | 544 KeyPairGenerator keygen; in getEcKeyGen() local 546 keygen = KeyPairGenerator.getInstance(EC_ALG); in getEcKeyGen() 552 keygen.initialize(new ECGenParameterSpec(EC_P256_OPENSSL_NAME)); in getEcKeyGen() 553 return keygen; in getEcKeyGen() 558 keygen.initialize(new ECGenParameterSpec(EC_P256_COMMON_NAME)); in getEcKeyGen() 559 return keygen; in getEcKeyGen() 570 KeyPairGenerator keygen = KeyPairGenerator.getInstance(RSA_ALG); in getRsaKeyGen() local 571 keygen.initialize(RSA2048_MODULUS_BITS); in getRsaKeyGen() 572 return keygen; in getRsaKeyGen() 586 KeyPairGenerator keygen = KeyPairGenerator.getInstance(DH_ALG); in getDhKeyGen() local [all …]
|
/external/boringssl/src/ssl/test/runner/hpke/ |
D | kem.go | 93 func x25519Encap(publicKeyR []byte, keygen GenerateKeyPairFunc) ([]byte, []byte, error) { 94 if keygen == nil { 95 keygen = GenerateKeyPair 97 publicKeyEphem, secretKeyEphem, err := keygen()
|
/external/openssh/regress/unittests/authopt/testdata/ |
D | mktestdata.sh | 9 ssh-keygen -q -f ca_key -t ed25519 -C CA -N '' 10 ssh-keygen -q -f user_key -t ed25519 -C "user key" -N '' 16 ssh-keygen -q -s ca_key -I user -n user \
|
/external/pdfium/core/fpdfapi/render/ |
D | cpdf_type3cache.cpp | 94 CPDF_UniqueKeyGen keygen; in LoadGlyph() local 95 keygen.Generate( in LoadGlyph() 98 ByteString FaceGlyphsKey(keygen.m_Key, keygen.m_KeyLen); in LoadGlyph()
|
/external/pdfium/core/fxge/ |
D | cfx_glyphcache.cpp | 257 UniqueKeyGen keygen; in LoadGlyphBitmap() local 263 GenKey(&keygen, pFont, matrix, dest_width, anti_alias, bNative); in LoadGlyphBitmap() 264 ByteString FaceGlyphsKey(keygen.key_, keygen.key_len_); in LoadGlyphBitmap() 307 GenKey(&keygen, pFont, matrix, dest_width, anti_alias, /*bNative=*/false); in LoadGlyphBitmap() 308 ByteString FaceGlyphsKey2(keygen.key_, keygen.key_len_); in LoadGlyphBitmap()
|
/external/python/rsa/tests/ |
D | test_cli.py | 117 self.assertExits(1, rsa.cli.keygen) 122 rsa.cli.keygen() 135 rsa.cli.keygen() 151 rsa.cli.keygen() 169 rsa.cli.keygen()
|
/external/openssh/ |
D | start-ssh | 15 /system/bin/ssh-keygen -t dsa -f $DSA_KEY -N "" 21 /system/bin/ssh-keygen -t rsa -f $RSA_KEY -N ""
|
D | README.dns | 15 ssh-keygen -r hostname -f keyfile -g 21 In the example above, ssh-keygen will print the fingerprint in a 24 you can omit the -g flag and ssh-keygen will print a standard SSHFP RR.
|
D | .gitignore | 26 ssh-keygen
|
D | README.md | 5 …tilities ``scp`` and ``sftp`` as well as tools for key generation (``ssh-keygen``), run-time key s… 15 * [ssh-keygen(1)](https://man.openbsd.org/ssh-keygen.1)
|
D | opensshd.init.in | 19 SSH_KEYGEN=$prefix/bin/ssh-keygen
|
/external/wycheproof/java/com/google/security/wycheproof/testcases/ |
D | RsaEncryptionTest.java | 100 KeyPairGenerator keygen = KeyPairGenerator.getInstance("RSA"); in testExceptions() local 101 keygen.initialize(1024); in testExceptions() 102 KeyPair keypair = keygen.genKeyPair(); in testExceptions()
|
/external/openssh/contrib/cygwin/ |
D | ssh-user-config | 57 ssh-keygen -t "${type}" -N "${passphrase}" -f "${pwdhome}/.ssh/${file}" > /dev/null 59 ssh-keygen -t "${type}" -f "${pwdhome}/.ssh/${file}" > /dev/null
|
/external/python/rsa/doc/ |
D | cli.rst | 12 .. index:: pyrsa-keygen, pyrsa-encrypt, pyrsa-decrypt, pyrsa-sign 19 | pyrsa-keygen | Generates a new RSA keypair in PEM or DER format | :py:func:`rsa.newkey…
|
/external/openssh/contrib/suse/ |
D | rc.sshd | 47 ssh-keygen -A
|
/external/boringssl/src/crypto/evp/ |
D | evp_ctx.c | 409 if (!ctx || !ctx->pmeth || !ctx->pmeth->keygen) { in EVP_PKEY_keygen_init() 418 if (!ctx || !ctx->pmeth || !ctx->pmeth->keygen) { in EVP_PKEY_keygen() 439 if (!ctx->pmeth->keygen(ctx, *out_pkey)) { in EVP_PKEY_keygen()
|