/external/autotest/client/site_tests/login_OwnershipRetaken/ |
login_OwnershipRetaken.py | 41 pubkey = ownership.known_pubkey() 53 pubkey, 58 if (utils.read_file(constants.OWNER_KEY_FILE) != pubkey): 72 if (utils.read_file(constants.OWNER_KEY_FILE) == pubkey):
|
/external/boringssl/src/crypto/x509/ |
x509spki.c | 68 return (X509_PUBKEY_set(&(x->spkac->pubkey), pkey)); 75 return (X509_PUBKEY_get(x->spkac->pubkey));
|
/external/curl/docs/cmdline-opts/ |
pubkey.d | 1 Long: pubkey
|
/system/iot/attestation/atap/libatap/ |
atap_ops.h | 72 * bytes to |pubkey|, and the size of the public key is written to 77 uint8_t pubkey[ATAP_KEY_LEN_MAX], 113 * ATAP_ECDH_KEY_LEN bytes of the public key to |pubkey|. Computes the 123 uint8_t pubkey[ATAP_ECDH_KEY_LEN],
|
/system/security/keystore-engine/ |
keystore_backend_binder.cpp | 63 int32_t KeystoreBackendBinder::get_pubkey(const char* key_id, uint8_t** pubkey, 81 *pubkey = hidl_pubkey.releaseData(); // caller should clean up memory.
|
/external/autotest/client/common_lib/cros/ |
policy.py | 115 def generate_policy(proto_binding_location, key, pubkey, policy, old_key=None): 119 |key|. Also includes the public key |pubkey|, signed with |old_key| 120 if provided. If not, |pubkey| is signed with |key|. The protobuf 126 @param pubkey: new public key to be signed and embedded in generated 130 is intended to represent a key rotation. pubkey will be 144 policy_proto.new_public_key = pubkey 145 policy_proto.new_public_key_signature = ownership.sign(old_key, pubkey)
|
/external/boringssl/src/crypto/evp/ |
p_ec.c | 146 const EC_POINT *pubkey = NULL; local 162 pubkey = EC_KEY_get0_public_key(ctx->peerkey->pkey.ec); 169 ret = ECDH_compute_key(key, outlen, pubkey, eckey, 0);
|
/external/scapy/scapy/layers/tls/ |
cert.py | 179 Metaclass for PubKey creation. 187 if cls is PubKey: 209 pubkey = spki.subjectPublicKey 210 if isinstance(pubkey, RSAPublicKey): 212 obj.import_from_asn1pkt(pubkey) 213 elif isinstance(pubkey, ECDSAPublicKey): 224 pubkey = RSAPublicKey(obj.der) 226 obj.import_from_asn1pkt(pubkey) 237 class PubKey(six.with_metaclass(_PubKeyFactory, object)): 252 class PubKeyRSA(PubKey, _EncryptAndVerifyRSA) [all...] |
keyexchange.py | 123 sig_len = s.client_certs[0].pubKey.pubkey.key_size // 8 326 pubkey = s.server_kx_privkey.public_key() 327 y = pubkey.public_numbers().y 328 self.dh_Ys = pkcs_i2osp(y, pubkey.key_size//8) 339 XXX Check that the pubkey received is in the group. 570 pubkey = s.server_kx_privkey.public_key() 571 self.point = pubkey.public_numbers().encode_point() 583 XXX Check that the pubkey received is on the curve. 643 pubNum = k.pubkey.public_numbers( [all...] |
/external/wpa_supplicant_8/src/wps/ |
wps_common.c | 64 struct wpabuf *pubkey, *dh_shared; local 75 pubkey = wps->registrar ? wps->dh_pubkey_e : wps->dh_pubkey_r; 76 if (pubkey == NULL) { 82 wpa_hexdump_buf(MSG_DEBUG, "WPS: DH peer Public Key", pubkey); 83 dh_shared = dh5_derive_shared(wps->dh_ctx, pubkey, wps->dh_privkey); 413 const struct wpabuf *pubkey, 422 if (wps_build_oob_dev_pw(data, dev_pw_id, pubkey, 624 struct wpabuf * wps_nfc_token_build(int ndef, int id, struct wpabuf *pubkey, 629 if (pubkey == NULL || dev_pw == NULL) 632 ret = wps_build_nfc_pw_token(id, pubkey, dev_pw) [all...] |
/system/keymaster/include/keymaster/key_blob_utils/ |
software_keyblobs.h | 38 keymaster_error_t FakeKeyAuthorizations(EVP_PKEY* pubkey,
|
/external/v8/tools/testrunner/server/ |
main.py | 141 if self.IsTrusted(p.pubkey): 147 status_handler.TryTransitiveTrust(p2, p.pubkey, self) 189 if peer.pubkey == fingerprint: 218 pubkey = data[1] 227 if not signatures.VerifySignature(filename, pubkey, signature,
|
/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/recoverablekeystore/storage/ |
RecoverableKeyStoreDbTest.java | 398 PublicKey pubkey = genRandomPublicKey(); local 399 mRecoverableKeyStoreDb.setRecoveryServicePublicKey(userId, uid, pubkey); 401 pubkey); 664 PublicKey pubkey = genRandomPublicKey(); local 665 mRecoverableKeyStoreDb.setRecoveryServicePublicKey(userId, uid, pubkey); 728 PublicKey pubkey = genRandomPublicKey(); local 729 mRecoverableKeyStoreDb.setRecoveryServicePublicKey(userId, uid1, pubkey); 730 mRecoverableKeyStoreDb.setRecoveryServicePublicKey(userId, uid2, pubkey); 732 pubkey); 734 pubkey); 742 PublicKey pubkey = genRandomPublicKey(); local [all...] |
/external/boringssl/src/ssl/ |
ssl_cert.cc | 261 UniquePtr<EVP_PKEY> pubkey = ssl_cert_parse_pubkey(&cert_cbs); local 262 if (!pubkey) { 267 if (!ssl_is_key_type_supported(pubkey->type)) { 274 if (pubkey->type == EVP_PKEY_EC && 282 !ssl_compare_public_and_private_key(pubkey.get(), privkey)) { 409 UniquePtr<EVP_PKEY> pubkey; local 420 pubkey = ssl_cert_parse_pubkey(&certificate); 421 if (!pubkey) { 443 *out_pubkey = std::move(pubkey); 529 int ssl_compare_public_and_private_key(const EVP_PKEY *pubkey, 574 UniquePtr<EVP_PKEY> pubkey = ssl_cert_parse_pubkey(&cert_cbs); local [all...] |
/external/autotest/client/site_tests/login_OwnershipApi/ |
login_OwnershipApi.py | 54 pubkey = ownership.known_pubkey() 68 pubkey,
|
/external/autotest/server/site_tests/firmware_UpdateFirmwareDataKeyVersion/files/ |
common.sh | 99 local pubkey=$3 108 --datapubkey "${pubkey}.vbpubk" \
|
/external/autotest/server/site_tests/firmware_UpdateKernelDataKeyVersion/files/ |
common.sh | 99 local pubkey=$3 108 --datapubkey "${pubkey}.vbpubk" \
|
/external/autotest/server/site_tests/firmware_UpdateKernelSubkeyVersion/files/ |
common.sh | 99 local pubkey=$3 108 --datapubkey "${pubkey}.vbpubk" \
|
/external/curl/lib/vtls/ |
cyassl.c | 542 curl_asn1Element *pubkey; local 561 pubkey = &x509_parsed.subjectPublicKeyInfo; 562 if(!pubkey->header || pubkey->end <= pubkey->header) { 569 (const unsigned char *)pubkey->header, 570 (size_t)(pubkey->end - pubkey->header));
|
/external/vboot_reference/scripts/keygeneration/ |
common.sh | 100 local pubkey=$3 109 --datapubkey "${pubkey}.vbpubk" \
|
/external/boringssl/src/crypto/x509v3/ |
v3_skey.c | 129 pk = ctx->subject_req->req_info->pubkey->public_key;
|
/external/syslinux/gpxe/src/include/gpxe/ |
tls.h | 96 struct pubkey_algorithm *pubkey; member in struct:tls_cipherspec
|
/external/v8/tools/testrunner/network/ |
network_execution.py | 98 release_lock_countdown = 1 # Pubkey. 103 pubkey = data[1] 104 if not pubkey: raise RuntimeError("Received empty public key") 105 self.pubkey_fingerprint = pubkey 179 pubkey=self.pubkey_fingerprint)
|
/system/iot/attestation/atap/ops/ |
atap_ops_delegate.h | 53 uint8_t pubkey[ATAP_KEY_LEN_MAX],
|
/system/keymaster/key_blob_utils/ |
software_keyblobs.cpp | 94 keymaster_error_t FakeKeyAuthorizations(EVP_PKEY* pubkey, 100 switch (EVP_PKEY_type(pubkey->type)) { 121 RSA_Ptr rsa(EVP_PKEY_get1_RSA(pubkey)); 145 UniquePtr<EC_KEY, EC_KEY_Delete> ec_key(EVP_PKEY_get1_EC_KEY(pubkey));
|