/external/boringssl/src/crypto/x509/ |
x509_r2x.c | 71 EVP_PKEY *pubkey = NULL; local 105 pubkey = X509_REQ_get_pubkey(r); 106 res = X509_set_pubkey(ret, pubkey); 107 EVP_PKEY_free(pubkey);
|
x_pubkey.c | 77 X509_PUBKEY *pubkey = (X509_PUBKEY *)*pval; local 78 EVP_PKEY_free(pubkey->pkey);
|
/external/syslinux/gpxe/src/crypto/ |
x509.c | 45 * @v pubkey Public key value to fill in 50 struct asn1_cursor *pubkey ) { 81 memcpy ( pubkey, &cursor, sizeof ( *pubkey ) ); 82 rc = ( asn1_skip ( pubkey, ASN1_SEQUENCE ), /* algorithm */ 83 asn1_enter ( pubkey, ASN1_BIT_STRING ) /* subjectPublicKey*/ ); 107 struct asn1_cursor pubkey; local 114 &pubkey ) ) != 0 ) 135 if ( ( pubkey.len < 1 ) || 136 ( ( *( uint8_t * ) pubkey.data ) != 0 ) ) [all...] |
/system/hardware/interfaces/wifi/keystore/1.0/default/ |
keystore.cpp | 43 ::std::vector<uint8_t> pubkey; local 44 auto ret = service->get_pubkey(String16(keyId.c_str()), &pubkey); 49 _hidl_cb(KeystoreStatusCode::SUCCESS, (hidl_vec<uint8_t>)pubkey);
|
/external/boringssl/src/crypto/evp/ |
p_ec.c | 146 const EC_POINT *pubkey = NULL; local 162 pubkey = EC_KEY_get0_public_key(ctx->peerkey->pkey.ec); 169 ret = ECDH_compute_key(key, outlen, pubkey, eckey, 0);
|
p_ed25519_asn1.c | 31 static int set_pubkey(EVP_PKEY *pkey, const uint8_t pubkey[32]) { 38 OPENSSL_memcpy(key->key.pub.value, pubkey, 32); 114 uint8_t pubkey[32], privkey[64]; local 115 ED25519_keypair_from_seed(pubkey, privkey, CBS_data(&inner));
|
/external/conscrypt/platform/src/main/java/org/conscrypt/ |
ChainStrengthAnalyzer.java | 75 Object pubkey = cert.getPublicKey(); local 76 if (pubkey instanceof RSAPublicKey) { 77 int modulusLength = ((RSAPublicKey) pubkey).getModulus().bitLength(); 82 } else if (pubkey instanceof ECPublicKey) { 84 ((ECPublicKey) pubkey).getParams().getCurve().getField().getFieldSize(); 89 } else if (pubkey instanceof DSAPublicKey) { 90 int pLength = ((DSAPublicKey) pubkey).getParams().getP().bitLength(); 91 int qLength = ((DSAPublicKey) pubkey).getParams().getQ().bitLength(); 99 throw new CertificateException("Rejecting unknown key class " + pubkey.getClass().getName());
|
/external/libchrome/crypto/ |
rsa_private_key_unittest.cc | 364 std::vector<uint8_t> pubkey; local 366 ASSERT_TRUE(key_pair->ExportPublicKey(&pubkey)); 374 ASSERT_EQ(pubkey, pubkey_copy);
|
/external/vboot_reference/futility/ |
cmd_vbutil_key.c | 73 VbPublicKey *pubkey; local 81 pubkey = PublicKeyReadKeyb(infile, algorithm, version); 82 if (pubkey) { 83 if (0 != PublicKeyWrite(outfile, pubkey)) { 87 free(pubkey); 108 VbPublicKey *pubkey; local 116 pubkey = PublicKeyRead(infile); 117 if (pubkey) { 119 printf("Algorithm: %" PRIu64 " %s\n", pubkey->algorithm, 120 (pubkey->algorithm < kNumAlgorithms [all...] |
cmd_create.c | 80 VbPublicKey *pubkey = 0; local 136 pubkey = PublicKeyAlloc(keyb_size, vb1_algorithm, opt_version); 137 if (!pubkey) 139 memcpy(GetPublicKeyData(pubkey), keyb_data, keyb_size); 143 if (0 != PublicKeyWrite(outfile, pubkey)) { 153 free(pubkey); 162 struct vb2_public_key *pubkey = 0; local 216 if (vb2_public_key_alloc(&pubkey, sig_alg)) { 231 pubkey_buf = vb2_public_key_packed_data(pubkey); 235 if (vb2_unpack_key_data(pubkey, pubkey_buf, keyb_size)) [all...] |
cmd_show.c | 47 static void show_key(VbPublicKey *pubkey, const char *sp) 49 printf("%sAlgorithm: %" PRIu64 " %s\n", sp, pubkey->algorithm, 50 (pubkey->algorithm < kNumAlgorithms ? 51 algo_strings[pubkey->algorithm] : "(invalid)")); 52 printf("%sKey Version: %" PRIu64 "\n", sp, pubkey->key_version); 54 PrintPubKeySha1Sum(pubkey); 94 VbPublicKey *pubkey = (VbPublicKey *)state->my_area->buf; local 96 if (!PublicKeyLooksOkay(pubkey, state->my_area->len)) { 102 show_key(pubkey, " "); 131 VbPublicKey *pubkey; local [all...] |
vb1_helper.c | 721 VbPublicKey *pubkey = (VbPublicKey *)buf; local 747 if (PublicKeyLooksOkay(pubkey, len))
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/netscape/ |
NetscapeCertRequest.java | 53 PublicKey pubkey ; field in class:NetscapeCertRequest 118 pubkey = KeyFactory.getInstance(keyAlg.getAlgorithm().getId(), "BC") 137 pubkey = pub_key; 141 //content_der.add(new SubjectPublicKeyInfo(sigAlg, new RSAPublicKeyStructure(pubkey.getModulus(), pubkey.getPublicExponent()).getDERObject())); 186 return pubkey; 191 pubkey = value; 208 sig.initVerify(pubkey); 264 baos.write(pubkey.getEncoded());
|
/external/vboot_reference/utility/ |
dumpRSAPublicKey.c | 140 RSA* pubkey = NULL; local 175 if (!(pubkey = EVP_PKEY_get1_RSA(key))) { 180 /* Read the pubkey in .PEM format. */ 181 if (!(pubkey = PEM_read_RSA_PUBKEY(fp, NULL, NULL, NULL))) { 187 if (check(pubkey)) { 188 output(pubkey); 193 RSA_free(pubkey);
|
/external/conscrypt/platform/src/main/java/org/conscrypt/ct/ |
CTLogStoreImpl.java | 227 PublicKey pubkey; local 229 pubkey = InternalUtil.readPublicKeyPem(new ByteArrayInputStream( 239 return new CTLogInfo(pubkey, description, url);
|
/external/wpa_supplicant_8/src/wps/ |
wps_attr_build.c | 23 struct wpabuf *pubkey = NULL; local 39 pubkey = wpabuf_dup(wps->wps->dh_pubkey); 62 pubkey = wpabuf_dup(wps->wps->ap_nfc_dh_pubkey); 63 wps->dh_ctx = dh5_init_fixed(wps->dh_privkey, pubkey); 68 wps->dh_ctx = dh5_init(&wps->dh_privkey, &pubkey); 69 pubkey = wpabuf_zeropad(pubkey, 192); 71 if (wps->dh_ctx == NULL || wps->dh_privkey == NULL || pubkey == NULL) { 74 wpabuf_free(pubkey); 78 wpa_hexdump_buf(MSG_DEBUG, "WPS: DH own Public Key", pubkey); [all...] |
wps_common.c | 64 struct wpabuf *pubkey, *dh_shared; local 75 pubkey = wps->registrar ? wps->dh_pubkey_e : wps->dh_pubkey_r; 76 if (pubkey == NULL) { 82 wpa_hexdump_buf(MSG_DEBUG, "WPS: DH peer Public Key", pubkey); 83 dh_shared = dh5_derive_shared(wps->dh_ctx, pubkey, wps->dh_privkey); 413 const struct wpabuf *pubkey, 422 if (wps_build_oob_dev_pw(data, dev_pw_id, pubkey, 624 struct wpabuf * wps_nfc_token_build(int ndef, int id, struct wpabuf *pubkey, 629 if (pubkey == NULL || dev_pw == NULL) 632 ret = wps_build_nfc_pw_token(id, pubkey, dev_pw) [all...] |
/system/core/adb/ |
adb_auth_host.cpp | 159 unsigned char* pubkey = nullptr; local 160 int len = i2d_RSA_PUBKEY(key, &pubkey); 168 SHA256(pubkey, len, reinterpret_cast<unsigned char*>(&result[0])); 169 OPENSSL_free(pubkey);
|
/system/security/keystore-engine/ |
android_engine.cpp | 362 uint8_t *pubkey = NULL; local 364 int32_t ret = g_keystore_backend->get_pubkey(key_id, &pubkey, &pubkey_len); 368 } else if (ret != 0 || pubkey == NULL) { 373 const uint8_t *inp = pubkey; 376 ALOGW("Cannot convert pubkey");
|
/external/boringssl/src/ssl/ |
ssl_cert.cc | 261 UniquePtr<EVP_PKEY> pubkey = ssl_cert_parse_pubkey(&cert_cbs); local 262 if (!pubkey) { 267 if (!ssl_is_key_type_supported(pubkey->type)) { 274 if (pubkey->type == EVP_PKEY_EC && 282 !ssl_compare_public_and_private_key(pubkey.get(), privkey)) { 409 UniquePtr<EVP_PKEY> pubkey; local 420 pubkey = ssl_cert_parse_pubkey(&certificate); 421 if (!pubkey) { 443 *out_pubkey = std::move(pubkey); 529 int ssl_compare_public_and_private_key(const EVP_PKEY *pubkey, 574 UniquePtr<EVP_PKEY> pubkey = ssl_cert_parse_pubkey(&cert_cbs); local [all...] |
/external/curl/lib/vtls/ |
cyassl.c | 542 curl_asn1Element *pubkey; local 561 pubkey = &x509_parsed.subjectPublicKeyInfo; 562 if(!pubkey->header || pubkey->end <= pubkey->header) { 569 (const unsigned char *)pubkey->header, 570 (size_t)(pubkey->end - pubkey->header));
|
mbedtls.c | 619 unsigned char pubkey[PUB_DER_MAX_BYTES]; local 643 size = mbedtls_pk_write_pubkey_der(&p->pk, pubkey, PUB_DER_MAX_BYTES); 655 &pubkey[PUB_DER_MAX_BYTES - size], size);
|
polarssl.c | 529 unsigned char pubkey[PUB_DER_MAX_BYTES]; local 556 size = pk_write_pubkey_der(&p->pk, pubkey, PUB_DER_MAX_BYTES); 568 &pubkey[PUB_DER_MAX_BYTES - size], size);
|
/external/syslinux/gpxe/src/include/gpxe/ |
tls.h | 96 struct pubkey_algorithm *pubkey; member in struct:tls_cipherspec
|
/external/avb/test/ |
avbtool_unittest.cc | 317 const uint8_t* pubkey = NULL; local 323 vbmeta_image_.data(), vbmeta_image_.size(), &pubkey, &pubkey_length)); 334 EXPECT_EQ(pubkey, expected_pubkey); [all...] |