/external/conscrypt/src/main/java/org/conscrypt/ |
ChainStrengthAnalyzer.java | 40 Object pubkey = cert.getPublicKey(); local 41 if (pubkey instanceof RSAPublicKey) { 42 int modulusLength = ((RSAPublicKey) pubkey).getModulus().bitLength();
|
/external/chromium_org/third_party/boringssl/src/crypto/x509/ |
x_spki.c | 66 ASN1_SIMPLE(NETSCAPE_SPKAC, pubkey, X509_PUBKEY),
|
x509rset.c | 78 return(X509_PUBKEY_set(&x->req_info->pubkey,pkey));
|
x_req.c | 96 ASN1_SIMPLE(X509_REQ_INFO, pubkey, X509_PUBKEY),
|
x509spki.c | 64 return(X509_PUBKEY_set(&(x->spkac->pubkey),pkey)); 71 return(X509_PUBKEY_get(x->spkac->pubkey));
|
/external/openssl/crypto/asn1/ |
x_spki.c | 69 ASN1_SIMPLE(NETSCAPE_SPKAC, pubkey, X509_PUBKEY),
|
t_spki.c | 80 i=OBJ_obj2nid(spki->spkac->pubkey->algor->algorithm); 83 pkey = X509_PUBKEY_get(spki->spkac->pubkey);
|
x_req.c | 97 ASN1_SIMPLE(X509_REQ_INFO, pubkey, X509_PUBKEY),
|
/external/wpa_supplicant_8/src/wps/ |
wps_attr_build.c | 23 struct wpabuf *pubkey; local 39 pubkey = wpabuf_dup(wps->wps->dh_pubkey); 62 pubkey = wpabuf_dup(wps->wps->ap_nfc_dh_pubkey); 63 wps->dh_ctx = dh5_init_fixed(wps->dh_privkey, pubkey); 68 wps->dh_ctx = dh5_init(&wps->dh_privkey, &pubkey); 69 pubkey = wpabuf_zeropad(pubkey, 192); 71 if (wps->dh_ctx == NULL || wps->dh_privkey == NULL || pubkey == NULL) { 74 wpabuf_free(pubkey); 78 wpa_hexdump_buf(MSG_DEBUG, "WPS: DH own Public Key", pubkey); [all...] |
wps_common.c | 64 struct wpabuf *pubkey, *dh_shared; local 75 pubkey = wps->registrar ? wps->dh_pubkey_e : wps->dh_pubkey_r; 76 if (pubkey == NULL) { 82 wpa_hexdump_buf(MSG_DEBUG, "WPS: DH peer Public Key", pubkey); 83 dh_shared = dh5_derive_shared(wps->dh_ctx, pubkey, wps->dh_privkey); 412 const struct wpabuf *pubkey, 421 if (wps_build_oob_dev_pw(data, dev_pw_id, pubkey, 618 struct wpabuf * wps_nfc_token_build(int ndef, int id, struct wpabuf *pubkey, 623 if (pubkey == NULL || dev_pw == NULL) 626 ret = wps_build_nfc_pw_token(id, pubkey, dev_pw) [all...] |
/external/chromium_org/v8/tools/testrunner/server/ |
status_handler.py | 57 for pubkey in pubkey_list: 58 if server.IsTrusted(pubkey): continue 59 result = _StatusQuery(peer, [constants.GET_SIGNED_PUBKEY, pubkey]) 71 def TryTransitiveTrust(peer, pubkey, server): 72 if _StatusQuery(peer, [constants.DO_YOU_TRUST, pubkey]): 73 result = _StatusQuery(peer, [constants.GET_SIGNED_PUBKEY, pubkey])
|
main.py | 141 if self.IsTrusted(p.pubkey): 147 status_handler.TryTransitiveTrust(p2, p.pubkey, self) 189 if peer.pubkey == fingerprint: 218 pubkey = data[1] 227 if not signatures.VerifySignature(filename, pubkey, signature,
|
/system/security/keystore-engine/ |
eng_keystore.cpp | 119 uint8_t *pubkey = NULL; local 121 int32_t ret = service->get_pubkey(String16(key_id), &pubkey, &pubkeyLen); 124 free(pubkey); 128 free(pubkey); 132 const unsigned char* tmp = reinterpret_cast<const unsigned char*>(pubkey); 134 free(pubkey); 136 ALOGW("Cannot convert pubkey");
|
/external/chromium_org/third_party/webrtc/base/ |
nssidentity.h | 30 NSSKeyPair(SECKEYPrivateKey* privkey, SECKEYPublicKey* pubkey) : 31 privkey_(privkey), pubkey_(pubkey) {} 39 SECKEYPublicKey * pubkey() const { return pubkey_; } function in class:rtc::NSSKeyPair
|
nssidentity.cc | 52 SECKEYPublicKey *pubkey = NULL; local 59 &rsaparams, &pubkey, PR_FALSE /*permanent*/, 66 return new NSSKeyPair(privkey, pubkey); 75 SECKEYPublicKey *pubkey = SECKEY_CopyPublicKey(pubkey_); 76 if (!pubkey) { 81 return new NSSKeyPair(privkey, pubkey); 366 spki = SECKEY_CreateSubjectPublicKeyInfo(keypair->pubkey()); 477 SECKEYPublicKey *pubkey = SECKEY_ConvertToPublicKey(privkey); local 485 scoped_ptr<NSSKeyPair> keypair(new NSSKeyPair(privkey, pubkey));
|
/external/chromium_org/v8/tools/testrunner/objects/ |
peer.py | 30 def __init__(self, address, jobs, rel_perf, pubkey): 34 self.pubkey = pubkey # string: pubkey's fingerprint
|
workpacket.py | 34 base_revision=None, patch=None, pubkey=None): 41 self.pubkey_fingerprint = pubkey 69 "pubkey": self.pubkey_fingerprint, 83 pubkey_fingerprint = packed["pubkey"] 90 pubkey=pubkey_fingerprint)
|
/external/chromium_org/net/cert/ |
jwk_serializer_openssl.cc | 97 crypto::ScopedEVP_PKEY pubkey(d2i_PUBKEY(NULL, &ptr, spki_der.size())); 98 if (!pubkey || ptr != data + spki_der.size()) 101 if (pubkey->type == EVP_PKEY_EC) { 102 return ConvertEcKeyToJwk(pubkey.get(), public_key_jwk, err_tracer);
|
/external/openssl/crypto/x509/ |
x509rset.c | 81 return(X509_PUBKEY_set(&x->req_info->pubkey,pkey));
|
x509spki.c | 66 return(X509_PUBKEY_set(&(x->spkac->pubkey),pkey)); 73 return(X509_PUBKEY_get(x->spkac->pubkey));
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/netscape/ |
NetscapeCertRequest.java | 53 PublicKey pubkey ; field in class:NetscapeCertRequest 120 pubkey = KeyFactory.getInstance(keyAlg.getObjectId().getId(), "BC") 139 pubkey = pub_key; 143 //content_der.add(new SubjectPublicKeyInfo(sigAlg, new RSAPublicKeyStructure(pubkey.getModulus(), pubkey.getPublicExponent()).getDERObject())); 188 return pubkey; 193 pubkey = value; 210 sig.initVerify(pubkey); 266 baos.write(pubkey.getEncoded());
|
/external/chromium_org/third_party/boringssl/src/crypto/x509v3/ |
v3_skey.c | 126 pk = ctx->subject_req->req_info->pubkey->public_key;
|
/external/chromium_org/v8/tools/testrunner/network/ |
network_execution.py | 100 release_lock_countdown = 1 # Pubkey. 105 pubkey = data[1] 106 if not pubkey: raise RuntimeError("Received empty public key") 107 self.pubkey_fingerprint = pubkey 181 pubkey=self.pubkey_fingerprint)
|
/external/openssl/crypto/x509v3/ |
v3_skey.c | 124 pk = ctx->subject_req->req_info->pubkey->public_key;
|
/external/openssl/apps/ |
spkac.c | 87 int verify=0,noout=0,pubkey=0; local 156 else if (strcmp(*argv,"-pubkey") == 0) 157 pubkey=1; 177 BIO_printf(bio_err," -pubkey output public key\n"); 295 if(pubkey) PEM_write_bio_PUBKEY(out, pkey);
|