/external/vboot_reference/tests/ |
vb20_common3_tests.c | 32 static void test_verify_keyblock(const VbPublicKey *public_key, 47 TEST_SUCC(vb2_unpack_key(&key, (uint8_t *)public_key, 48 public_key->key_offset + public_key->key_size), 172 static void test_verify_fw_preamble(const VbPublicKey *public_key, 189 TEST_SUCC(vb2_unpack_key(&rsa, (uint8_t *)public_key, 190 public_key->key_offset + public_key->key_size),
|
vboot_common3_tests.c | 30 static void KeyBlockVerifyTest(const VbPublicKey *public_key, 47 TEST_EQ(KeyBlockVerify(hdr, hsize, public_key, 0), 0, 109 TEST_NEQ(KeyBlockVerify(h, hsize, public_key, 0), 0, 115 TEST_NEQ(KeyBlockVerify(h, hsize, public_key, 0), 0, 120 TEST_NEQ(KeyBlockVerify(h, hsize, public_key, 0), 0, 125 TEST_NEQ(KeyBlockVerify(h, hsize, public_key, 1), 0, 166 static void VerifyFirmwarePreambleTest(const VbPublicKey *public_key, 178 rsa = PublicKeyToRSA(public_key);
|
/system/tpm/attestation/server/ |
attestation_service_test.cc | 452 key.set_public_key("public_key"); 471 EXPECT_EQ("public_key", reply.public_key()); 487 key.set_public_key("public_key"); 502 EXPECT_EQ("public_key", reply.public_key()); 548 database->mutable_credentials()->set_endorsement_public_key("public_key"); 553 EXPECT_EQ("public_key", reply.ek_public_key()); 579 database->mutable_credentials()->set_endorsement_public_key("public_key"); 583 EXPECT_EQ("public_key", reply.ek_public_key()) [all...] |
attestation_service.cc | 200 if (!GetSubjectPublicKeyInfo(key.key_type(), key.public_key(), 246 std::string public_key; local 247 if (!tpm_utility_->GetEndorsementPublicKey(&public_key)) { 251 database_pb.mutable_credentials()->set_endorsement_public_key(public_key); 401 if (!GetSubjectPublicKeyInfo(key.key_type(), key.public_key(), 502 key.public_key(), key.certified_key_credential())) { 740 std::string public_key; local 751 &public_key, 758 key->set_public_key(public_key); 923 const std::string& public_key, [all...] |
/system/tpm/attestation/client/ |
dbus_proxy_test.cc | 110 reply_proto.set_public_key("public_key"); 127 EXPECT_EQ("public_key", reply.public_key()); 153 reply_proto.set_ek_public_key("public_key"); 166 EXPECT_EQ("public_key", reply.ek_public_key()); 189 reply_proto.set_public_key("public_key"); 205 EXPECT_EQ("public_key", reply.public_key()); 276 reply_proto.set_public_key("public_key"); 290 EXPECT_EQ("public_key", reply.public_key()) [all...] |
/system/tpm/attestation/common/ |
crypto_utility_impl.cc | 166 const std::string& public_key, 168 auto asn1_ptr = reinterpret_cast<const unsigned char*>(public_key.data()); 170 public_key.size())); 189 std::string* public_key) { 207 public_key->assign(reinterpret_cast<char*>(buffer), length); 270 bool CryptoUtilityImpl::EncryptForUnbind(const std::string& public_key, 279 auto asn1_ptr = reinterpret_cast<const unsigned char*>(public_key.data()); 280 crypto::ScopedRSA rsa(d2i_RSA_PUBKEY(NULL, &asn1_ptr, public_key.size())); 293 bool CryptoUtilityImpl::VerifySignature(const std::string& public_key, 296 auto asn1_ptr = reinterpret_cast<const unsigned char*>(public_key.data()) [all...] |
tpm_utility.h | 62 std::string* public_key, 77 virtual bool GetEndorsementPublicKey(std::string* public_key) = 0;
|
interface.proto | 72 optional bytes public_key = 4; 100 optional bytes public_key = 2; 137 optional bytes public_key = 2;
|
/external/tlsdate/src/ |
tlsdate-helper-plan9.c | 260 get_certificate_keybits (EVP_PKEY *public_key) 266 switch (public_key->type) 270 key_bits = BN_num_bits(public_key->pkey.rsa->n); 274 key_bits = BN_num_bits(public_key->pkey.rsa->n); 278 key_bits = BN_num_bits(public_key->pkey.dsa->p); 282 key_bits = BN_num_bits(public_key->pkey.dsa->p); 286 key_bits = BN_num_bits(public_key->pkey.dsa->p); 290 key_bits = BN_num_bits(public_key->pkey.dsa->p); 294 key_bits = BN_num_bits(public_key->pkey.dsa->p); 298 key_bits = BN_num_bits(public_key->pkey.dh->pub_key) 693 const rsa_context *public_key; local 726 EVP_PKEY *public_key; local [all...] |
tlsdate-helper-plan9.h | 102 uint32_t get_certificate_keybits (EVP_PKEY *public_key);
|
/system/tpm/trunks/ |
trunks_client_test.cc | 894 std::string public_key; local 907 const std::string& public_key = public_key_map[key_handle.get()]; local 915 const std::string& public_key = public_key_map[key_handle.get()]; local 939 std::string public_key; local [all...] |
/external/autotest/client/cros/scripts/ |
destination | 15 common_args = ['<certificate>', '<public_key>', '<nonce>',
|
/system/connectivity/shill/shims/ |
crypto_util.cc | 61 // Encrypt |data| with |public_key|. |public_key| is the raw bytes of a key in 63 // maximum length permissable for encryption with a key of |public_key| size. 68 bool EncryptByteStringImpl(const string& public_key, 78 reinterpret_cast<const unsigned char*>(public_key.data()); 79 *rsa_ptr = d2i_RSAPublicKey(NULL, &throwaway_ptr, public_key.length()); 124 message.public_key(), message.data(), &rsa, &encrypted_output);
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/oauth2client/tests/ |
test_jwt.py | 68 public_key = datafile('publickey.pem') 73 verifier = self.verifier.from_string(public_key, True) 80 public_key = datafile('publickey.pem') 81 certs = {'foo': public_key} 106 public_key = datafile('publickey.pem') 107 certs = {'foo': public_key}
|
/external/autotest/client/site_tests/network_DestinationVerification/ |
network_DestinationVerification.py | 35 "public_key":"MIGJAoGBAK3SXmWZBOhJibv8It05qIbgHXXhnCXxHkW+C6jNMHR5sZgDpFaOY1xwXERjKdJxcwrEy3VAT5Uv9MgHPBvxxJku76HYh1yVfIw1rhLnHBTHSxwUzJNCrgc3l3t/UACacLjVNIzccDpYf2vnOcA+t1t6IXRjzuU2NdwY4dJXNtWPAgMBAAE=", 60 "public_key": "MIGJAoGBAOe+6bF51A7wFVMbyPiHYLdgAmP6sdhOUohqCHn4qHSfDY41AbAbVmXLbUZ5BF2KSdDYqU4fAXoaI8V8D5DRWh57Ax10Sl1/6M1u22KT6FYQyUToXGPcXldBzRRMok8H4XyiebDVevjvvV6yuABSYYhfSlrMdGj8qxRVwTxx0CItAgMBAAE=", 87 "public_key":"MIIBCgKCAQEApQoxFRJWEP9Oa+lSF2PCMBCpd2LYeyPMHjVKCF2IlrGbrgQ3U9wI6tBvLkHg570KSA6onL/7e9J31RLwA8gIE0zJ9M7NToxj1cVa8jOqXPIllJP7uY/TmtMIwCvuMCu6KBNW/wzKK6jkT7wScwrPJscmwWr/0h6lKXZrv0DhwvVv3i6VGsasZzVYlOoZ7eRe1OHiJgehPFUh0Vp7lVRDzumtJ0N6hybWP/Ap6dNlcO9Hq67bljHRrgwuBT2iRJBIdZt6m4xZlf78dH6Y2gfeQ3GBtDZWbZ5v6hzaYeIxlMTelz6ZlEQa0fPegK1dsxCddvLhRCDQr2bZlwyRdof6uwIDAQAB", 230 test_data['public_key'], 255 def _test_encrypt(self, public_key, data_to_encrypt, expect_failure=False): 261 @param public_key: string containing RSAPublicKey format RSA key. 267 message.public_key = public_key
|
/external/boringssl/src/include/openssl/ |
curve25519.h | 81 * |public_key| of |message_len| bytes from |message|. It returns zero 85 const uint8_t public_key[32]);
|
/external/libchrome/crypto/ |
nss_key_util.cc | 67 ScopedSECKEYPublicKey* public_key, 81 public_key->reset(public_key_raw);
|
/external/autotest/client/site_tests/login_UserPolicyKeys/ |
login_UserPolicyKeys.py | 104 # outer PolicyFetchResponse that contains the public_key. 105 public_key = ownership.known_pubkey() 110 public_key,
|
/system/connectivity/shill/dbus_bindings/ |
org.chromium.flimflam.Manager.dbus-xml | 108 <arg name="public_key" type="s" direction="in"/> 119 <arg name="public_key" type="s" direction="in"/> 131 <arg name="public_key" type="s" direction="in"/>
|
/system/keymaster/ |
nist_curve_key_exchange_test.cpp | 108 uint8_t* public_key = new uint8_t[public_key_len]; local 110 public_key, public_key_len, nullptr /* ctx */); 119 ASSERT_FALSE(key_exchange->CalculateSharedKey(reinterpret_cast<const uint8_t*>(public_key),
|
/external/boringssl/src/crypto/evp/ |
p_dsa_asn1.c | 78 ASN1_INTEGER *public_key = NULL; local 108 public_key = d2i_ASN1_INTEGER(NULL, &p, pklen); 109 if (public_key == NULL) { 114 dsa->pub_key = ASN1_INTEGER_to_BN(public_key, NULL); 120 ASN1_INTEGER_free(public_key); 125 ASN1_INTEGER_free(public_key);
|
/system/connectivity/shill/dbus/ |
chromeos_manager_dbus_adaptor.cc | 420 const string& public_key, 430 manager_->VerifyDestination(certificate, public_key, nonce, 448 const string& public_key, 460 manager_->VerifyAndEncryptCredentials(certificate, public_key, nonce, 480 const string& public_key, 492 manager_->VerifyAndEncryptData(certificate, public_key, nonce,
|
chromeos_manager_dbus_adaptor.h | 134 const std::string& public_key, 142 const std::string& public_key, 151 const std::string& public_key,
|
/external/oauth/core/src/main/java/net/oauth/signature/ |
RSA_SHA1.java | 58 * c.setProperty(RSA_SHA1.PUBLIC_KEY, consumer_publicRSAKey); 86 final static public String PUBLIC_KEY = "RSA-SHA1.PublicKey"; 114 Object publicKeyObject = accessor.consumer.getProperty(PUBLIC_KEY);
|
/external/wpa_supplicant_8/src/wps/ |
wps_attr_parse.h | 66 const u8 *public_key; member in struct:wps_parse_attr
|