HomeSort by relevance Sort by last modified time
    Searched refs:pubkey (Results 26 - 50 of 115) sorted by null

12 3 4 5

  /external/autotest/client/site_tests/login_OwnershipRetaken/
login_OwnershipRetaken.py 41 pubkey = ownership.known_pubkey()
53 pubkey,
58 if (utils.read_file(constants.OWNER_KEY_FILE) != pubkey):
72 if (utils.read_file(constants.OWNER_KEY_FILE) == pubkey):
  /external/boringssl/src/crypto/x509/
x509spki.c 68 return (X509_PUBKEY_set(&(x->spkac->pubkey), pkey));
75 return (X509_PUBKEY_get(x->spkac->pubkey));
  /external/curl/docs/cmdline-opts/
pubkey.d 1 Long: pubkey
  /system/iot/attestation/atap/libatap/
atap_ops.h 72 * bytes to |pubkey|, and the size of the public key is written to
77 uint8_t pubkey[ATAP_KEY_LEN_MAX],
113 * ATAP_ECDH_KEY_LEN bytes of the public key to |pubkey|. Computes the
123 uint8_t pubkey[ATAP_ECDH_KEY_LEN],
  /system/security/keystore-engine/
keystore_backend_binder.cpp 63 int32_t KeystoreBackendBinder::get_pubkey(const char* key_id, uint8_t** pubkey,
81 *pubkey = hidl_pubkey.releaseData(); // caller should clean up memory.
  /external/autotest/client/common_lib/cros/
policy.py 115 def generate_policy(proto_binding_location, key, pubkey, policy, old_key=None):
119 |key|. Also includes the public key |pubkey|, signed with |old_key|
120 if provided. If not, |pubkey| is signed with |key|. The protobuf
126 @param pubkey: new public key to be signed and embedded in generated
130 is intended to represent a key rotation. pubkey will be
144 policy_proto.new_public_key = pubkey
145 policy_proto.new_public_key_signature = ownership.sign(old_key, pubkey)
  /external/boringssl/src/crypto/evp/
p_ec.c 146 const EC_POINT *pubkey = NULL; local
162 pubkey = EC_KEY_get0_public_key(ctx->peerkey->pkey.ec);
169 ret = ECDH_compute_key(key, outlen, pubkey, eckey, 0);
  /external/scapy/scapy/layers/tls/
cert.py 179 Metaclass for PubKey creation.
187 if cls is PubKey:
209 pubkey = spki.subjectPublicKey
210 if isinstance(pubkey, RSAPublicKey):
212 obj.import_from_asn1pkt(pubkey)
213 elif isinstance(pubkey, ECDSAPublicKey):
224 pubkey = RSAPublicKey(obj.der)
226 obj.import_from_asn1pkt(pubkey)
237 class PubKey(six.with_metaclass(_PubKeyFactory, object)):
252 class PubKeyRSA(PubKey, _EncryptAndVerifyRSA)
    [all...]
keyexchange.py 123 sig_len = s.client_certs[0].pubKey.pubkey.key_size // 8
326 pubkey = s.server_kx_privkey.public_key()
327 y = pubkey.public_numbers().y
328 self.dh_Ys = pkcs_i2osp(y, pubkey.key_size//8)
339 XXX Check that the pubkey received is in the group.
570 pubkey = s.server_kx_privkey.public_key()
571 self.point = pubkey.public_numbers().encode_point()
583 XXX Check that the pubkey received is on the curve.
643 pubNum = k.pubkey.public_numbers(
    [all...]
  /external/wpa_supplicant_8/src/wps/
wps_common.c 64 struct wpabuf *pubkey, *dh_shared; local
75 pubkey = wps->registrar ? wps->dh_pubkey_e : wps->dh_pubkey_r;
76 if (pubkey == NULL) {
82 wpa_hexdump_buf(MSG_DEBUG, "WPS: DH peer Public Key", pubkey);
83 dh_shared = dh5_derive_shared(wps->dh_ctx, pubkey, wps->dh_privkey);
413 const struct wpabuf *pubkey,
422 if (wps_build_oob_dev_pw(data, dev_pw_id, pubkey,
624 struct wpabuf * wps_nfc_token_build(int ndef, int id, struct wpabuf *pubkey,
629 if (pubkey == NULL || dev_pw == NULL)
632 ret = wps_build_nfc_pw_token(id, pubkey, dev_pw)
    [all...]
  /system/keymaster/include/keymaster/key_blob_utils/
software_keyblobs.h 38 keymaster_error_t FakeKeyAuthorizations(EVP_PKEY* pubkey,
  /external/v8/tools/testrunner/server/
main.py 141 if self.IsTrusted(p.pubkey):
147 status_handler.TryTransitiveTrust(p2, p.pubkey, self)
189 if peer.pubkey == fingerprint:
218 pubkey = data[1]
227 if not signatures.VerifySignature(filename, pubkey, signature,
  /frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/recoverablekeystore/storage/
RecoverableKeyStoreDbTest.java 398 PublicKey pubkey = genRandomPublicKey(); local
399 mRecoverableKeyStoreDb.setRecoveryServicePublicKey(userId, uid, pubkey);
401 pubkey);
664 PublicKey pubkey = genRandomPublicKey(); local
665 mRecoverableKeyStoreDb.setRecoveryServicePublicKey(userId, uid, pubkey);
728 PublicKey pubkey = genRandomPublicKey(); local
729 mRecoverableKeyStoreDb.setRecoveryServicePublicKey(userId, uid1, pubkey);
730 mRecoverableKeyStoreDb.setRecoveryServicePublicKey(userId, uid2, pubkey);
732 pubkey);
734 pubkey);
742 PublicKey pubkey = genRandomPublicKey(); local
    [all...]
  /external/boringssl/src/ssl/
ssl_cert.cc 261 UniquePtr<EVP_PKEY> pubkey = ssl_cert_parse_pubkey(&cert_cbs); local
262 if (!pubkey) {
267 if (!ssl_is_key_type_supported(pubkey->type)) {
274 if (pubkey->type == EVP_PKEY_EC &&
282 !ssl_compare_public_and_private_key(pubkey.get(), privkey)) {
409 UniquePtr<EVP_PKEY> pubkey; local
420 pubkey = ssl_cert_parse_pubkey(&certificate);
421 if (!pubkey) {
443 *out_pubkey = std::move(pubkey);
529 int ssl_compare_public_and_private_key(const EVP_PKEY *pubkey,
574 UniquePtr<EVP_PKEY> pubkey = ssl_cert_parse_pubkey(&cert_cbs); local
    [all...]
  /external/autotest/client/site_tests/login_OwnershipApi/
login_OwnershipApi.py 54 pubkey = ownership.known_pubkey()
68 pubkey,
  /external/autotest/server/site_tests/firmware_UpdateFirmwareDataKeyVersion/files/
common.sh 99 local pubkey=$3
108 --datapubkey "${pubkey}.vbpubk" \
  /external/autotest/server/site_tests/firmware_UpdateKernelDataKeyVersion/files/
common.sh 99 local pubkey=$3
108 --datapubkey "${pubkey}.vbpubk" \
  /external/autotest/server/site_tests/firmware_UpdateKernelSubkeyVersion/files/
common.sh 99 local pubkey=$3
108 --datapubkey "${pubkey}.vbpubk" \
  /external/curl/lib/vtls/
cyassl.c 542 curl_asn1Element *pubkey; local
561 pubkey = &x509_parsed.subjectPublicKeyInfo;
562 if(!pubkey->header || pubkey->end <= pubkey->header) {
569 (const unsigned char *)pubkey->header,
570 (size_t)(pubkey->end - pubkey->header));
  /external/vboot_reference/scripts/keygeneration/
common.sh 100 local pubkey=$3
109 --datapubkey "${pubkey}.vbpubk" \
  /external/boringssl/src/crypto/x509v3/
v3_skey.c 129 pk = ctx->subject_req->req_info->pubkey->public_key;
  /external/syslinux/gpxe/src/include/gpxe/
tls.h 96 struct pubkey_algorithm *pubkey; member in struct:tls_cipherspec
  /external/v8/tools/testrunner/network/
network_execution.py 98 release_lock_countdown = 1 # Pubkey.
103 pubkey = data[1]
104 if not pubkey: raise RuntimeError("Received empty public key")
105 self.pubkey_fingerprint = pubkey
179 pubkey=self.pubkey_fingerprint)
  /system/iot/attestation/atap/ops/
atap_ops_delegate.h 53 uint8_t pubkey[ATAP_KEY_LEN_MAX],
  /system/keymaster/key_blob_utils/
software_keyblobs.cpp 94 keymaster_error_t FakeKeyAuthorizations(EVP_PKEY* pubkey,
100 switch (EVP_PKEY_type(pubkey->type)) {
121 RSA_Ptr rsa(EVP_PKEY_get1_RSA(pubkey));
145 UniquePtr<EC_KEY, EC_KEY_Delete> ec_key(EVP_PKEY_get1_EC_KEY(pubkey));

Completed in 458 milliseconds

12 3 4 5