/external/conscrypt/platform/src/main/java/org/conscrypt/ |
ChainStrengthAnalyzer.java | 75 Object pubkey = cert.getPublicKey(); local 76 if (pubkey instanceof RSAPublicKey) { 77 int modulusLength = ((RSAPublicKey) pubkey).getModulus().bitLength(); 82 } else if (pubkey instanceof ECPublicKey) { 84 ((ECPublicKey) pubkey).getParams().getCurve().getField().getFieldSize(); 89 } else if (pubkey instanceof DSAPublicKey) { 90 int pLength = ((DSAPublicKey) pubkey).getParams().getP().bitLength(); 91 int qLength = ((DSAPublicKey) pubkey).getParams().getQ().bitLength(); 99 throw new CertificateException("Rejecting unknown key class " + pubkey.getClass().getName());
|
/external/vboot_reference/futility/ |
cmd_vbutil_key.c | 73 VbPublicKey *pubkey; local 81 pubkey = PublicKeyReadKeyb(infile, algorithm, version); 82 if (pubkey) { 83 if (0 != PublicKeyWrite(outfile, pubkey)) { 87 free(pubkey); 108 VbPublicKey *pubkey; local 116 pubkey = PublicKeyRead(infile); 117 if (pubkey) { 119 printf("Algorithm: %" PRIu64 " %s\n", pubkey->algorithm, 120 (pubkey->algorithm < kNumAlgorithms [all...] |
cmd_create.c | 80 VbPublicKey *pubkey = 0; local 136 pubkey = PublicKeyAlloc(keyb_size, vb1_algorithm, opt_version); 137 if (!pubkey) 139 memcpy(GetPublicKeyData(pubkey), keyb_data, keyb_size); 143 if (0 != PublicKeyWrite(outfile, pubkey)) { 153 free(pubkey); 162 struct vb2_public_key *pubkey = 0; local 216 if (vb2_public_key_alloc(&pubkey, sig_alg)) { 231 pubkey_buf = vb2_public_key_packed_data(pubkey); 235 if (vb2_unpack_key_data(pubkey, pubkey_buf, keyb_size)) [all...] |
cmd_show.c | 47 static void show_key(VbPublicKey *pubkey, const char *sp) 49 printf("%sAlgorithm: %" PRIu64 " %s\n", sp, pubkey->algorithm, 50 (pubkey->algorithm < kNumAlgorithms ? 51 algo_strings[pubkey->algorithm] : "(invalid)")); 52 printf("%sKey Version: %" PRIu64 "\n", sp, pubkey->key_version); 54 PrintPubKeySha1Sum(pubkey); 94 VbPublicKey *pubkey = (VbPublicKey *)state->my_area->buf; local 96 if (!PublicKeyLooksOkay(pubkey, state->my_area->len)) { 102 show_key(pubkey, " "); 131 VbPublicKey *pubkey; local [all...] |
/external/syslinux/gpxe/src/crypto/ |
x509.c | 45 * @v pubkey Public key value to fill in 50 struct asn1_cursor *pubkey ) { 81 memcpy ( pubkey, &cursor, sizeof ( *pubkey ) ); 82 rc = ( asn1_skip ( pubkey, ASN1_SEQUENCE ), /* algorithm */ 83 asn1_enter ( pubkey, ASN1_BIT_STRING ) /* subjectPublicKey*/ ); 107 struct asn1_cursor pubkey; local 114 &pubkey ) ) != 0 ) 135 if ( ( pubkey.len < 1 ) || 136 ( ( *( uint8_t * ) pubkey.data ) != 0 ) ) [all...] |
/external/boringssl/src/crypto/x509/ |
x509_r2x.c | 71 EVP_PKEY *pubkey = NULL; local 105 pubkey = X509_REQ_get_pubkey(r); 106 res = X509_set_pubkey(ret, pubkey); 107 EVP_PKEY_free(pubkey);
|
x_spki.c | 68 ASN1_SIMPLE(NETSCAPE_SPKAC, pubkey, X509_PUBKEY),
|
x509rset.c | 80 return (X509_PUBKEY_set(&x->req_info->pubkey, pkey));
|
x_req.c | 92 ASN1_SIMPLE(X509_REQ_INFO, pubkey, X509_PUBKEY),
|
/system/security/keystore-engine/ |
keystore_backend.h | 33 virtual int32_t get_pubkey(const char *key_id, uint8_t** pubkey,
|
keystore_backend_binder.h | 34 int32_t get_pubkey(const char *key_id, uint8_t** pubkey,
|
keystore_backend_hidl.h | 34 int32_t get_pubkey(const char *key_id, uint8_t** pubkey,
|
keystore_backend_hidl.cpp | 65 const char *key_id, uint8_t** pubkey, size_t* pubkey_len) { 66 if (key_id == NULL || pubkey == NULL || pubkey_len == NULL) { 82 *pubkey = publicKey.releaseData();
|
/external/scapy/scapy/layers/tls/ |
keyexchange_tls13.py | 36 __slots__ = ["privkey", "pubkey"] 45 self.pubkey = None 67 pubkey = privkey.public_key() 68 self.key_exchange = pubkey.public_numbers().y 74 pubkey = privkey.public_key() 75 self.key_exchange = pubkey.public_bytes() 80 pubkey = privkey.public_key() 81 self.key_exchange = pubkey.public_numbers().encode_point() 106 self.pubkey = public_numbers.public_key(default_backend()) 111 self.pubkey = import_point(self.key_exchange [all...] |
/external/wpa_supplicant_8/src/wps/ |
wps_attr_build.c | 23 struct wpabuf *pubkey = NULL; local 39 pubkey = wpabuf_dup(wps->wps->dh_pubkey); 62 pubkey = wpabuf_dup(wps->wps->ap_nfc_dh_pubkey); 63 wps->dh_ctx = dh5_init_fixed(wps->dh_privkey, pubkey); 68 wps->dh_ctx = dh5_init(&wps->dh_privkey, &pubkey); 69 pubkey = wpabuf_zeropad(pubkey, 192); 71 if (wps->dh_ctx == NULL || wps->dh_privkey == NULL || pubkey == NULL) { 74 wpabuf_free(pubkey); 78 wpa_hexdump_buf(MSG_DEBUG, "WPS: DH own Public Key", pubkey); [all...] |
/external/v8/tools/testrunner/server/ |
status_handler.py | 57 for pubkey in pubkey_list: 58 if server.IsTrusted(pubkey): continue 59 result = _StatusQuery(peer, [constants.GET_SIGNED_PUBKEY, pubkey]) 71 def TryTransitiveTrust(peer, pubkey, server): 72 if _StatusQuery(peer, [constants.DO_YOU_TRUST, pubkey]): 73 result = _StatusQuery(peer, [constants.GET_SIGNED_PUBKEY, pubkey])
|
/external/vboot_reference/utility/ |
dumpRSAPublicKey.c | 140 RSA* pubkey = NULL; local 175 if (!(pubkey = EVP_PKEY_get1_RSA(key))) { 180 /* Read the pubkey in .PEM format. */ 181 if (!(pubkey = PEM_read_RSA_PUBKEY(fp, NULL, NULL, NULL))) { 187 if (check(pubkey)) { 188 output(pubkey); 193 RSA_free(pubkey);
|
/external/v8/tools/testrunner/objects/ |
peer.py | 30 def __init__(self, address, jobs, rel_perf, pubkey): 34 self.pubkey = pubkey # string: pubkey's fingerprint
|
workpacket.py | 34 base_revision=None, patch=None, pubkey=None): 41 self.pubkey_fingerprint = pubkey 69 "pubkey": self.pubkey_fingerprint, 83 pubkey_fingerprint = packed["pubkey"] 90 pubkey=pubkey_fingerprint)
|
/system/hardware/interfaces/wifi/keystore/1.0/default/ |
keystore.cpp | 43 ::std::vector<uint8_t> pubkey; local 44 auto ret = service->get_pubkey(String16(keyId.c_str()), &pubkey); 49 _hidl_cb(KeystoreStatusCode::SUCCESS, (hidl_vec<uint8_t>)pubkey);
|
/prebuilts/misc/scripts/vboot_signer/ |
vboot_signer.sh | 37 pubkey=$3 48 ${futility} vbutil_keyblock --pack ${keyblock} --datapubkey ${pubkey} --signprivate ${subkey} --flags 0x7
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/netscape/ |
NetscapeCertRequest.java | 53 PublicKey pubkey ; field in class:NetscapeCertRequest 118 pubkey = KeyFactory.getInstance(keyAlg.getAlgorithm().getId(), "BC") 137 pubkey = pub_key; 141 //content_der.add(new SubjectPublicKeyInfo(sigAlg, new RSAPublicKeyStructure(pubkey.getModulus(), pubkey.getPublicExponent()).getDERObject())); 186 return pubkey; 191 pubkey = value; 208 sig.initVerify(pubkey); 264 baos.write(pubkey.getEncoded());
|
/external/boringssl/src/crypto/evp/ |
p_ed25519_asn1.c | 31 static int set_pubkey(EVP_PKEY *pkey, const uint8_t pubkey[32]) { 38 OPENSSL_memcpy(key->key.pub.value, pubkey, 32); 114 uint8_t pubkey[32], privkey[64]; local 115 ED25519_keypair_from_seed(pubkey, privkey, CBS_data(&inner));
|
/system/iot/attestation/atap/test/ |
fake_atap_ops.cpp | 58 uint8_t pubkey[ATAP_KEY_LEN_MAX],
|
fake_atap_ops.h | 52 uint8_t pubkey[ATAP_KEY_LEN_MAX],
|