- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 21 for RSA (0.01 sec)
-
okhttp-tls/src/main/kotlin/okhttp3/tls/HeldCertificate.kt
} /** * Returns the RSA private key encoded in [PKCS #1][rfc_8017] [PEM format][rfc_7468]. * * [rfc_8017]: https://tools.ietf.org/html/rfc8017 * [rfc_7468]: https://tools.ietf.org/html/rfc7468 */ fun privateKeyPkcs1Pem(): String { check(keyPair.private is RSAPrivateKey) { "PKCS1 only supports RSA keys" } return buildString { append("-----BEGIN RSA PRIVATE KEY-----\n")
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Wed Mar 19 19:25:20 UTC 2025 - 21.6K bytes - Viewed (0) -
okhttp-tls/src/test/java/okhttp3/tls/HeldCertificateTest.kt
|-----END CERTIFICATE----- |-----BEGIN RSA PRIVATE KEY----- |sXPVYAsGD1wizrXX+wFaL3chtF1oG1Fx/jcsSsG6BA== |-----END RSA PRIVATE KEY----- | """.trimMargin(), ) fail<Any>() } catch (expected: IllegalArgumentException) { assertThat(expected.message).isEqualTo("unexpected type: RSA PRIVATE KEY") } } @Test
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Wed Mar 19 19:25:20 UTC 2025 - 22.6K bytes - Viewed (0) -
okhttp/src/jvmTest/kotlin/okhttp3/internal/tls/HostnameVerifierTest.kt
// [x509_extensions] // subjectAltName=DNS:localhost.localdomain,DNS:localhost,IP:127.0.0.1 // // $ openssl req -x509 -nodes -days 36500 -subj '/CN=localhost' -config ./cert.cnf \ // -newkey rsa:512 -out cert.pem val certificate = certificate( """ -----BEGIN CERTIFICATE----- MIIBWDCCAQKgAwIBAgIJANS1EtICX2AZMA0GCSqGSIb3DQEBBQUAMBQxEjAQBgNV
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Wed Mar 19 19:25:20 UTC 2025 - 40.4K bytes - Viewed (0) -
src/main/java/org/codelibs/core/crypto/CachedCipher.java
} private static final String BLOWFISH = "Blowfish"; private static final String RSA = "RSA"; /** * The algorithm to use for the cipher. */ protected String algorithm = BLOWFISH; /** * The transformation to use for the cipher. */ protected String transformation = RSA; /** * The key to use for encryption/decryption. */ protected String key;
Registered: Fri Sep 05 20:58:11 UTC 2025 - Last Modified: Sat Jul 05 00:11:05 UTC 2025 - 11.5K bytes - Viewed (0) -
okhttp-tls/src/test/java/okhttp3/tls/internal/der/DerCertificatesTest.kt
).decodeBase64()!! val x509PublicKey = encodeKey( algorithm = RSA_ENCRYPTION, publicKeyBytes = publicKeyBytes, ) val keyFactory = KeyFactory.getInstance("RSA") val publicKey = keyFactory.generatePublic(X509EncodedKeySpec(x509PublicKey.toByteArray())) val privateKey = keyFactory.generatePrivate(PKCS8EncodedKeySpec(privateKeyBytes.toByteArray())) val certificate =
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Wed Mar 19 19:25:20 UTC 2025 - 43.9K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/mylasta/direction/FessFwAssistantDirector.java
} else if ("des".equalsIgnoreCase(cipherAlgorism)) { inver = InvertibleCryptographer.createDesCipher(fessConfig.getAppCipherKey()); } else if ("rsa".equalsIgnoreCase(cipherAlgorism)) { inver = InvertibleCryptographer.createRsaCipher(fessConfig.getAppCipherKey()); } else {
Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Thu Jul 17 08:28:31 UTC 2025 - 9.4K bytes - Viewed (0) -
okhttp/src/androidMain/kotlin/okhttp3/internal/platform/android/AndroidCertificateChainCleaner.kt
hostname: String, ): List<Certificate> { val certificates = (chain as List<X509Certificate>).toTypedArray() try { return x509TrustManagerExtensions.checkServerTrusted(certificates, "RSA", hostname) } catch (ce: CertificateException) { throw SSLPeerUnverifiedException(ce.message).apply { initCause(ce) } } } override fun equals(other: Any?): Boolean =
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Fri Dec 27 13:39:56 UTC 2024 - 2.7K bytes - Viewed (0) -
samples/guide/src/main/java/okhttp3/recipes/kt/WiresharkExample.kt
return } // https://timothybasanov.com/2016/05/26/java-pre-master-secret.html // https://security.stackexchange.com/questions/35639/decrypting-tls-in-wireshark-when-using-dhe-rsa-ciphersuites // https://stackoverflow.com/questions/36240279/how-do-i-extract-the-pre-master-secret-using-an-openssl-based-client // TLSv1.2 Events // Produced ClientHello handshake message
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Sat May 10 11:15:14 UTC 2025 - 10.9K bytes - Viewed (0) -
okhttp/src/commonJvmAndroid/kotlin/okhttp3/CertificatePinner.kt
* Peer certificate chain: * sha256/afwiKY3RxoMmLkuRW1l7QsPZTJPwDS2pdDROQjXw8ig=: CN=publicobject.com, OU=PositiveSSL * sha256/klO23nT2ehFDXCfx3eHTDRESMz3asj1muO+4aIdjiuY=: CN=COMODO RSA Secure Server CA * sha256/grX4Ta9HpZx6tSHkmCrvpApTQGo67CYDnvprLg5yRME=: CN=COMODO RSA Certification Authority * sha256/lCppFqbkrlJ3EcVFAkeip0+44VaoJUymbnOaEUk7tEU=: CN=AddTrust External CA Root * Pinned certificates for publicobject.com:
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Wed Mar 19 19:25:20 UTC 2025 - 14.1K bytes - Viewed (0) -
okhttp-testing-support/src/main/kotlin/okhttp3/testing/PlatformRule.kt
const val LOOM_PROPERTY = "loom" /** * For whatever reason our BouncyCastle provider doesn't work with ECDSA keys. Just configure it * to use RSA-2048 instead. * * (We otherwise prefer ECDSA because it's faster.) */ private val localhostHandshakeCertificatesWithRsa2048: HandshakeCertificates by lazy { val heldCertificate =
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Wed Mar 19 19:25:20 UTC 2025 - 15.4K bytes - Viewed (1)