HomeSort by relevance Sort by last modified time
    Searched refs:pubkey (Results 1 - 25 of 115) sorted by null

1 2 3 4 5

  /external/conscrypt/platform/src/main/java/org/conscrypt/
ChainStrengthAnalyzer.java 75 Object pubkey = cert.getPublicKey(); local
76 if (pubkey instanceof RSAPublicKey) {
77 int modulusLength = ((RSAPublicKey) pubkey).getModulus().bitLength();
82 } else if (pubkey instanceof ECPublicKey) {
84 ((ECPublicKey) pubkey).getParams().getCurve().getField().getFieldSize();
89 } else if (pubkey instanceof DSAPublicKey) {
90 int pLength = ((DSAPublicKey) pubkey).getParams().getP().bitLength();
91 int qLength = ((DSAPublicKey) pubkey).getParams().getQ().bitLength();
99 throw new CertificateException("Rejecting unknown key class " + pubkey.getClass().getName());
  /external/vboot_reference/futility/
cmd_vbutil_key.c 73 VbPublicKey *pubkey; local
81 pubkey = PublicKeyReadKeyb(infile, algorithm, version);
82 if (pubkey) {
83 if (0 != PublicKeyWrite(outfile, pubkey)) {
87 free(pubkey);
108 VbPublicKey *pubkey; local
116 pubkey = PublicKeyRead(infile);
117 if (pubkey) {
119 printf("Algorithm: %" PRIu64 " %s\n", pubkey->algorithm,
120 (pubkey->algorithm < kNumAlgorithms
    [all...]
cmd_create.c 80 VbPublicKey *pubkey = 0; local
136 pubkey = PublicKeyAlloc(keyb_size, vb1_algorithm, opt_version);
137 if (!pubkey)
139 memcpy(GetPublicKeyData(pubkey), keyb_data, keyb_size);
143 if (0 != PublicKeyWrite(outfile, pubkey)) {
153 free(pubkey);
162 struct vb2_public_key *pubkey = 0; local
216 if (vb2_public_key_alloc(&pubkey, sig_alg)) {
231 pubkey_buf = vb2_public_key_packed_data(pubkey);
235 if (vb2_unpack_key_data(pubkey, pubkey_buf, keyb_size))
    [all...]
cmd_show.c 47 static void show_key(VbPublicKey *pubkey, const char *sp)
49 printf("%sAlgorithm: %" PRIu64 " %s\n", sp, pubkey->algorithm,
50 (pubkey->algorithm < kNumAlgorithms ?
51 algo_strings[pubkey->algorithm] : "(invalid)"));
52 printf("%sKey Version: %" PRIu64 "\n", sp, pubkey->key_version);
54 PrintPubKeySha1Sum(pubkey);
94 VbPublicKey *pubkey = (VbPublicKey *)state->my_area->buf; local
96 if (!PublicKeyLooksOkay(pubkey, state->my_area->len)) {
102 show_key(pubkey, " ");
131 VbPublicKey *pubkey; local
    [all...]
  /external/syslinux/gpxe/src/crypto/
x509.c 45 * @v pubkey Public key value to fill in
50 struct asn1_cursor *pubkey ) {
81 memcpy ( pubkey, &cursor, sizeof ( *pubkey ) );
82 rc = ( asn1_skip ( pubkey, ASN1_SEQUENCE ), /* algorithm */
83 asn1_enter ( pubkey, ASN1_BIT_STRING ) /* subjectPublicKey*/ );
107 struct asn1_cursor pubkey; local
114 &pubkey ) ) != 0 )
135 if ( ( pubkey.len < 1 ) ||
136 ( ( *( uint8_t * ) pubkey.data ) != 0 ) )
    [all...]
  /external/boringssl/src/crypto/x509/
x509_r2x.c 71 EVP_PKEY *pubkey = NULL; local
105 pubkey = X509_REQ_get_pubkey(r);
106 res = X509_set_pubkey(ret, pubkey);
107 EVP_PKEY_free(pubkey);
x_spki.c 68 ASN1_SIMPLE(NETSCAPE_SPKAC, pubkey, X509_PUBKEY),
x509rset.c 80 return (X509_PUBKEY_set(&x->req_info->pubkey, pkey));
x_req.c 92 ASN1_SIMPLE(X509_REQ_INFO, pubkey, X509_PUBKEY),
  /system/security/keystore-engine/
keystore_backend.h 33 virtual int32_t get_pubkey(const char *key_id, uint8_t** pubkey,
keystore_backend_binder.h 34 int32_t get_pubkey(const char *key_id, uint8_t** pubkey,
keystore_backend_hidl.h 34 int32_t get_pubkey(const char *key_id, uint8_t** pubkey,
keystore_backend_hidl.cpp 65 const char *key_id, uint8_t** pubkey, size_t* pubkey_len) {
66 if (key_id == NULL || pubkey == NULL || pubkey_len == NULL) {
82 *pubkey = publicKey.releaseData();
  /external/scapy/scapy/layers/tls/
keyexchange_tls13.py 36 __slots__ = ["privkey", "pubkey"]
45 self.pubkey = None
67 pubkey = privkey.public_key()
68 self.key_exchange = pubkey.public_numbers().y
74 pubkey = privkey.public_key()
75 self.key_exchange = pubkey.public_bytes()
80 pubkey = privkey.public_key()
81 self.key_exchange = pubkey.public_numbers().encode_point()
106 self.pubkey = public_numbers.public_key(default_backend())
111 self.pubkey = import_point(self.key_exchange
    [all...]
  /external/wpa_supplicant_8/src/wps/
wps_attr_build.c 23 struct wpabuf *pubkey = NULL; local
39 pubkey = wpabuf_dup(wps->wps->dh_pubkey);
62 pubkey = wpabuf_dup(wps->wps->ap_nfc_dh_pubkey);
63 wps->dh_ctx = dh5_init_fixed(wps->dh_privkey, pubkey);
68 wps->dh_ctx = dh5_init(&wps->dh_privkey, &pubkey);
69 pubkey = wpabuf_zeropad(pubkey, 192);
71 if (wps->dh_ctx == NULL || wps->dh_privkey == NULL || pubkey == NULL) {
74 wpabuf_free(pubkey);
78 wpa_hexdump_buf(MSG_DEBUG, "WPS: DH own Public Key", pubkey);
    [all...]
  /external/v8/tools/testrunner/server/
status_handler.py 57 for pubkey in pubkey_list:
58 if server.IsTrusted(pubkey): continue
59 result = _StatusQuery(peer, [constants.GET_SIGNED_PUBKEY, pubkey])
71 def TryTransitiveTrust(peer, pubkey, server):
72 if _StatusQuery(peer, [constants.DO_YOU_TRUST, pubkey]):
73 result = _StatusQuery(peer, [constants.GET_SIGNED_PUBKEY, pubkey])
  /external/vboot_reference/utility/
dumpRSAPublicKey.c 140 RSA* pubkey = NULL; local
175 if (!(pubkey = EVP_PKEY_get1_RSA(key))) {
180 /* Read the pubkey in .PEM format. */
181 if (!(pubkey = PEM_read_RSA_PUBKEY(fp, NULL, NULL, NULL))) {
187 if (check(pubkey)) {
188 output(pubkey);
193 RSA_free(pubkey);
  /external/v8/tools/testrunner/objects/
peer.py 30 def __init__(self, address, jobs, rel_perf, pubkey):
34 self.pubkey = pubkey # string: pubkey's fingerprint
workpacket.py 34 base_revision=None, patch=None, pubkey=None):
41 self.pubkey_fingerprint = pubkey
69 "pubkey": self.pubkey_fingerprint,
83 pubkey_fingerprint = packed["pubkey"]
90 pubkey=pubkey_fingerprint)
  /system/hardware/interfaces/wifi/keystore/1.0/default/
keystore.cpp 43 ::std::vector<uint8_t> pubkey; local
44 auto ret = service->get_pubkey(String16(keyId.c_str()), &pubkey);
49 _hidl_cb(KeystoreStatusCode::SUCCESS, (hidl_vec<uint8_t>)pubkey);
  /prebuilts/misc/scripts/vboot_signer/
vboot_signer.sh 37 pubkey=$3
48 ${futility} vbutil_keyblock --pack ${keyblock} --datapubkey ${pubkey} --signprivate ${subkey} --flags 0x7
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/netscape/
NetscapeCertRequest.java 53 PublicKey pubkey ; field in class:NetscapeCertRequest
118 pubkey = KeyFactory.getInstance(keyAlg.getAlgorithm().getId(), "BC")
137 pubkey = pub_key;
141 //content_der.add(new SubjectPublicKeyInfo(sigAlg, new RSAPublicKeyStructure(pubkey.getModulus(), pubkey.getPublicExponent()).getDERObject()));
186 return pubkey;
191 pubkey = value;
208 sig.initVerify(pubkey);
264 baos.write(pubkey.getEncoded());
  /external/boringssl/src/crypto/evp/
p_ed25519_asn1.c 31 static int set_pubkey(EVP_PKEY *pkey, const uint8_t pubkey[32]) {
38 OPENSSL_memcpy(key->key.pub.value, pubkey, 32);
114 uint8_t pubkey[32], privkey[64]; local
115 ED25519_keypair_from_seed(pubkey, privkey, CBS_data(&inner));
  /system/iot/attestation/atap/test/
fake_atap_ops.cpp 58 uint8_t pubkey[ATAP_KEY_LEN_MAX],
fake_atap_ops.h 52 uint8_t pubkey[ATAP_KEY_LEN_MAX],

Completed in 1164 milliseconds

1 2 3 4 5