/external/conscrypt/src/main/java/org/conscrypt/ |
ChainStrengthAnalyzer.java | 40 Object pubkey = cert.getPublicKey(); local 41 if (pubkey instanceof RSAPublicKey) { 42 int modulusLength = ((RSAPublicKey) pubkey).getModulus().bitLength();
|
/external/chromium_org/third_party/openssl/openssl/crypto/asn1/ |
x_spki.c | 69 ASN1_SIMPLE(NETSCAPE_SPKAC, pubkey, X509_PUBKEY),
|
t_spki.c | 80 i=OBJ_obj2nid(spki->spkac->pubkey->algor->algorithm); 83 pkey = X509_PUBKEY_get(spki->spkac->pubkey);
|
x_req.c | 97 ASN1_SIMPLE(X509_REQ_INFO, pubkey, X509_PUBKEY),
|
/external/openssl/crypto/asn1/ |
x_spki.c | 69 ASN1_SIMPLE(NETSCAPE_SPKAC, pubkey, X509_PUBKEY),
|
t_spki.c | 80 i=OBJ_obj2nid(spki->spkac->pubkey->algor->algorithm); 83 pkey = X509_PUBKEY_get(spki->spkac->pubkey);
|
x_req.c | 97 ASN1_SIMPLE(X509_REQ_INFO, pubkey, X509_PUBKEY),
|
/external/wpa_supplicant_8/src/wps/ |
wps_attr_build.c | 23 struct wpabuf *pubkey; local 39 pubkey = wpabuf_dup(wps->wps->dh_pubkey); 62 pubkey = wpabuf_dup(wps->wps->ap_nfc_dh_pubkey); 63 wps->dh_ctx = dh5_init_fixed(wps->dh_privkey, pubkey); 68 wps->dh_ctx = dh5_init(&wps->dh_privkey, &pubkey); 69 pubkey = wpabuf_zeropad(pubkey, 192); 71 if (wps->dh_ctx == NULL || wps->dh_privkey == NULL || pubkey == NULL) { 74 wpabuf_free(pubkey); 78 wpa_hexdump_buf(MSG_DEBUG, "WPS: DH own Public Key", pubkey); [all...] |
wps_common.c | 64 struct wpabuf *pubkey, *dh_shared; local 75 pubkey = wps->registrar ? wps->dh_pubkey_e : wps->dh_pubkey_r; 76 if (pubkey == NULL) { 82 wpa_hexdump_buf(MSG_DEBUG, "WPS: DH peer Public Key", pubkey); 83 dh_shared = dh5_derive_shared(wps->dh_ctx, pubkey, wps->dh_privkey); 412 const struct wpabuf *pubkey, 421 if (wps_build_oob_dev_pw(data, dev_pw_id, pubkey, 618 struct wpabuf * wps_nfc_token_build(int ndef, int id, struct wpabuf *pubkey, 623 if (pubkey == NULL || dev_pw == NULL) 626 ret = wps_build_nfc_pw_token(id, pubkey, dev_pw) [all...] |
/external/chromium_org/v8/tools/testrunner/server/ |
status_handler.py | 57 for pubkey in pubkey_list: 58 if server.IsTrusted(pubkey): continue 59 result = _StatusQuery(peer, [constants.GET_SIGNED_PUBKEY, pubkey]) 71 def TryTransitiveTrust(peer, pubkey, server): 72 if _StatusQuery(peer, [constants.DO_YOU_TRUST, pubkey]): 73 result = _StatusQuery(peer, [constants.GET_SIGNED_PUBKEY, pubkey])
|
main.py | 141 if self.IsTrusted(p.pubkey): 147 status_handler.TryTransitiveTrust(p2, p.pubkey, self) 189 if peer.pubkey == fingerprint: 218 pubkey = data[1] 227 if not signatures.VerifySignature(filename, pubkey, signature,
|
/system/security/keystore-engine/ |
eng_keystore.cpp | 119 uint8_t *pubkey = NULL; local 121 int32_t ret = service->get_pubkey(String16(key_id), &pubkey, &pubkeyLen); 124 free(pubkey); 128 free(pubkey); 132 const unsigned char* tmp = reinterpret_cast<const unsigned char*>(pubkey); 134 free(pubkey); 136 ALOGW("Cannot convert pubkey");
|
/external/chromium_org/crypto/ |
rsa_private_key_nss_unittest.cc | 41 std::vector<uint8> pubkey; local 43 ASSERT_TRUE(key_pair->ExportPublicKey(&pubkey)); 51 ASSERT_EQ(pubkey, pubkey_copy);
|
/external/chromium_org/third_party/libjingle/source/talk/base/ |
nssidentity.h | 47 NSSKeyPair(SECKEYPrivateKey* privkey, SECKEYPublicKey* pubkey) : 48 privkey_(privkey), pubkey_(pubkey) {} 56 SECKEYPublicKey * pubkey() const { return pubkey_; } function in class:talk_base::NSSKeyPair
|
nssidentity.cc | 70 SECKEYPublicKey *pubkey = NULL; local 77 &rsaparams, &pubkey, PR_FALSE /*permanent*/, 84 return new NSSKeyPair(privkey, pubkey); 93 SECKEYPublicKey *pubkey = SECKEY_CopyPublicKey(pubkey_); 94 if (!pubkey) { 99 return new NSSKeyPair(privkey, pubkey); 384 spki = SECKEY_CreateSubjectPublicKeyInfo(keypair->pubkey()); 495 SECKEYPublicKey *pubkey = SECKEY_ConvertToPublicKey(privkey); local 503 scoped_ptr<NSSKeyPair> keypair(new NSSKeyPair(privkey, pubkey));
|
/external/chromium_org/third_party/webrtc/base/ |
nssidentity.h | 30 NSSKeyPair(SECKEYPrivateKey* privkey, SECKEYPublicKey* pubkey) : 31 privkey_(privkey), pubkey_(pubkey) {} 39 SECKEYPublicKey * pubkey() const { return pubkey_; } function in class:rtc::NSSKeyPair
|
nssidentity.cc | 52 SECKEYPublicKey *pubkey = NULL; local 59 &rsaparams, &pubkey, PR_FALSE /*permanent*/, 66 return new NSSKeyPair(privkey, pubkey); 75 SECKEYPublicKey *pubkey = SECKEY_CopyPublicKey(pubkey_); 76 if (!pubkey) { 81 return new NSSKeyPair(privkey, pubkey); 366 spki = SECKEY_CreateSubjectPublicKeyInfo(keypair->pubkey()); 477 SECKEYPublicKey *pubkey = SECKEY_ConvertToPublicKey(privkey); local 485 scoped_ptr<NSSKeyPair> keypair(new NSSKeyPair(privkey, pubkey));
|
/external/chromium_org/v8/tools/testrunner/objects/ |
peer.py | 30 def __init__(self, address, jobs, rel_perf, pubkey): 34 self.pubkey = pubkey # string: pubkey's fingerprint
|
workpacket.py | 34 base_revision=None, patch=None, pubkey=None): 41 self.pubkey_fingerprint = pubkey 69 "pubkey": self.pubkey_fingerprint, 83 pubkey_fingerprint = packed["pubkey"] 90 pubkey=pubkey_fingerprint)
|
/external/chromium_org/third_party/openssl/openssl/crypto/x509/ |
x509rset.c | 81 return(X509_PUBKEY_set(&x->req_info->pubkey,pkey));
|
x509spki.c | 66 return(X509_PUBKEY_set(&(x->spkac->pubkey),pkey)); 73 return(X509_PUBKEY_get(x->spkac->pubkey));
|
/external/openssl/crypto/x509/ |
x509rset.c | 81 return(X509_PUBKEY_set(&x->req_info->pubkey,pkey));
|
x509spki.c | 66 return(X509_PUBKEY_set(&(x->spkac->pubkey),pkey)); 73 return(X509_PUBKEY_get(x->spkac->pubkey));
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/netscape/ |
NetscapeCertRequest.java | 53 PublicKey pubkey ; field in class:NetscapeCertRequest 120 pubkey = KeyFactory.getInstance(keyAlg.getObjectId().getId(), "BC") 139 pubkey = pub_key; 143 //content_der.add(new SubjectPublicKeyInfo(sigAlg, new RSAPublicKeyStructure(pubkey.getModulus(), pubkey.getPublicExponent()).getDERObject())); 188 return pubkey; 193 pubkey = value; 210 sig.initVerify(pubkey); 266 baos.write(pubkey.getEncoded());
|
/system/extras/verity/ |
KeystoreSigner.java | 92 PublicKey pubkey = Utils.loadDERPublicKey(der); local 93 BootKey k = new BootKey(pubkey);
|