/system/connectivity/shill/ |
crypto_util_proxy.cc | 78 const string& public_key, 92 public_key.c_str(), 127 const string& public_key, 132 if (!brillo::data_encoding::Base64Decode(public_key, &decoded_public_key)) {
|
manager.h | 457 // |certificate| is a PEM encoded x509 certificate, |public_key| is a base64 462 const std::string& public_key, 472 // |public_key|, the base64 encoded public half of an RSA key pair. Returns 477 const std::string& public_key, 488 // under |public_key|. Similar to EncryptData above except that the 492 const std::string& public_key, [all...] |
manager.cc | [all...] |
/system/tpm/attestation/common/ |
print_interface_proto.cc | 202 output += indent + " public_key: "; 204 base::HexEncode(value.public_key().data(), 205 value.public_key().size()).c_str()); 332 output += indent + " public_key: "; 334 base::HexEncode(value.public_key().data(), 335 value.public_key().size()).c_str()); 493 output += indent + " public_key: "; 495 base::HexEncode(value.public_key().data(), 496 value.public_key().size()).c_str());
|
tpm_utility_v1.cc | 175 std::string* public_key, 179 CHECK(key_blob && public_key && public_key_tpm_format && key_info && proof); 262 if (!ConvertPublicKeyToDER(*public_key_tpm_format, public_key)) { 397 bool TpmUtilityV1::GetEndorsementPublicKey(std::string* public_key) { 417 if (!ConvertPublicKeyToDER(ek_public_key_blob, public_key)) { 678 bool TpmUtilityV1::ConvertPublicKeyToDER(const std::string& public_key, 682 std::string mutable_public_key(public_key);
|
database.proto | 66 optional bytes public_key = 2;
|
/external/tlsdate/src/ |
tlsdate-helper.c | 430 get_certificate_keybits (EVP_PKEY *public_key) 438 key_type_str = key_type_to_str(public_key->type); 442 verb("V: key type: %d", public_key->type); 444 key_bits = EVP_PKEY_bits(public_key); 830 const rsa_context *public_key; local 842 public_key = &certificate->rsa; 843 if (NULL == public_key) 849 key_bits = mpi_msb (&public_key->N); 863 EVP_PKEY *public_key; local 869 public_key = X509_get_pubkey (certificate) [all...] |
tlsdate-helper.h | 128 uint32_t get_certificate_keybits (EVP_PKEY *public_key);
|
/external/boringssl/src/crypto/x509v3/ |
v3_skey.c | 127 pk = ctx->subject_req->req_info->pubkey->public_key; 128 else pk = ctx->subject_cert->cert_info->key->public_key;
|
/external/boringssl/src/crypto/evp/ |
p_ec_asn1.c | 381 const EC_POINT *public_key; local 398 public_key = EC_KEY_get0_public_key(x); 399 if (public_key != NULL) { 401 group, public_key, EC_KEY_get_conv_form(x), NULL, 0, ctx); 412 EC_POINT_point2oct(group, public_key, EC_KEY_get_conv_form(x),
|
/external/boringssl/src/tool/ |
speed.cc | 408 uint8_t public_key[32], private_key[64]; local 410 if (!TimeFunction(&results, [&public_key, &private_key]() -> bool { 411 ED25519_keypair(public_key, private_key); 431 if (!TimeFunction(&results, [&public_key, &signature]() -> bool { 433 public_key) == 1;
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/util/ |
BaseCipherSpi.java | 204 if (wrappedKeyType == Cipher.PUBLIC_KEY)
|
/external/cros/system_api/dbus/cryptohome/ |
key.proto | 24 optional bytes public_key = 3;
|
/external/wpa_supplicant_8/src/tls/ |
x509v3.h | 63 u8 *public_key; member in struct:x509_certificate
|
/external/smali/baksmali/src/main/java/org/jf/baksmali/ |
baksmali.java | 95 Integer public_key = Integer.decode(attr.getValue("id")); local 103 options.resourceIds.put(public_key, public_val);
|
/system/connectivity/shill/test-scripts/ |
crypto_util_pb2.py | 81 name='public_key', full_name='shill_protos.EncryptDataMessage.public_key', index=0,
|
/system/connectivity/shill/doc/ |
manager-api.txt | 368 string public_key 378 PEM format. |public_key| is the base64 encoded public 422 string public_key 431 and then uses |public_key| to encrypt the psk for the 437 string public_key 446 and then uses |public_key| to encrypt
|
/system/update_engine/payload_generator/ |
generate_delta_main.cc | 171 const string& public_key) { 175 LOG_IF(FATAL, public_key.empty()) 176 << "Must pass --public_key to verify signed payload."; 177 CHECK(PayloadSigner::VerifySignedPayload(in_file, public_key)); 279 DEFINE_string(public_key, "", "Path to public key in .pem format");
|
/external/autotest/server/ |
base_utils.py | 317 public_key = open(public_key_path, 'r') 318 public_key_str = public_key.read() 319 public_key.close()
|
/external/autotest/server/hosts/ |
ssh_host.py | 288 public_key = utils.get_public_key() 295 public_key)
|
/system/tpm/attestation/server/ |
attestation_service.h | 273 // |public_key|. On success returns true and provides |public_key_info|. 275 const std::string& public_key,
|
pkcs11_key_store.cc | 265 crypto::ScopedRSA public_key(d2i_RSAPublicKey(nullptr, 268 if (!public_key.get()) { 272 std::string modulus(BN_num_bytes(public_key.get()->n), 0); 273 int length = BN_bn2bin(public_key.get()->n, reinterpret_cast<unsigned char*>(
|
/external/vboot_reference/tests/ |
vb20_common2_tests.c | 160 fprintf(stderr, "Error reading public_key: %s\n", filename);
|
/external/webrtc/tools/sslroots/ |
generate_sslroots.py | 33 _PUBLIC_KEY_ARRAY = 'public_key'
|
/external/boringssl/src/crypto/x509/ |
t_x509.c | 279 if (!EVP_Digest(x->cert_info->key->public_key->data, 280 x->cert_info->key->public_key->length,
|