/external/ipsec-tools/src/racoon/ |
H A D | eaytest.c | 137 char *pubkey = local 156 printf ("%s", pubkey); 172 printf("Verification with correct pubkey: "); 173 if (rsa_verify_with_pubkey (&src, sig, pubkey) != 0) { 182 printf("Verification with wrong pubkey: ");
|
/external/boringssl/src/crypto/evp/ |
H A D | evp_extra_test.cc | 575 bssl::UniquePtr<EVP_PKEY> pubkey(EVP_PKEY_new_ed25519_public(kPublicKey)); 576 ASSERT_TRUE(pubkey); 577 EXPECT_EQ(EVP_PKEY_ED25519, EVP_PKEY_id(pubkey.get())); 584 ASSERT_TRUE(EVP_marshal_public_key(cbb.get(), pubkey.get())); 591 EXPECT_FALSE(EVP_marshal_private_key(cbb.get(), pubkey.get())); 617 EXPECT_EQ(1, EVP_PKEY_cmp(pubkey.get(), privkey.get())); 622 EXPECT_EQ(0, EVP_PKEY_cmp(pubkey.get(), pubkey2.get()));
|
/external/libchrome/crypto/ |
H A D | rsa_private_key_unittest.cc | 364 std::vector<uint8_t> pubkey; local 366 ASSERT_TRUE(key_pair->ExportPublicKey(&pubkey)); 374 ASSERT_EQ(pubkey, pubkey_copy);
|
/external/curl/lib/vtls/ |
H A D | darwinssl.c | 2163 unsigned char *pubkey = NULL, *realpubkey = NULL; local 2207 pubkey = (unsigned char *)CFDataGetBytePtr(publicKeyBits); 2237 result = Curl_pin_peer_pubkey(data, pinnedpubkey, pubkey, 2249 memcpy(realpubkey + spkiHeaderLength, pubkey, pubkeylen);
|
H A D | nss.c | 1041 SECKEYPublicKey *pubkey = CERT_ExtractPublicKey(cert); local 1042 if(pubkey) { 1044 SECItem *cert_der = PK11_DEREncodePublicKey(pubkey); 1051 SECKEY_DestroyPublicKey(pubkey);
|
/external/conscrypt/common/src/jni/main/cpp/conscrypt/ |
H A D | native_crypto.cc | 950 const EC_POINT* pubkey = local 952 JNI_TRACE("EVP_PKEY_new_EC_KEY(%p, %p, %p) <- ptr", group, pubkey, keyJavaBytes); 970 JNI_TRACE("EVP_PKEY_new_EC_KEY(%p, %p, %p) > EC_KEY_set_group failed", group, pubkey, 976 if (pubkey != nullptr) { 977 if (EC_KEY_set_public_key(eckey.get(), pubkey) != 1) { 979 pubkey, keyJavaBytes); 988 pubkey, keyJavaBytes); 992 if (pubkey == nullptr) { 996 pubkey, keyJavaBytes); 1005 JNI_TRACE("EVP_KEY_new_EC_KEY(%p, %p, %p) => invalid key created", group, pubkey, 5548 X509_PUBKEY* pubkey = X509_get_X509_PUBKEY(x509); local [all...] |
/external/avb/test/ |
H A D | avbtool_unittest.cc | 317 const uint8_t* pubkey = NULL; local 323 vbmeta_image_.data(), vbmeta_image_.size(), &pubkey, &pubkey_length)); 334 EXPECT_EQ(pubkey, expected_pubkey);
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | dpp_hostapd.c | 1104 bi->pubkey = pkex->peer_bootstrap_key; 1151 bi->pubkey = pkex->peer_bootstrap_key;
|
/external/wpa_supplicant_8/src/ap/ |
H A D | dpp_hostapd.c | 1104 bi->pubkey = pkex->peer_bootstrap_key; 1151 bi->pubkey = pkex->peer_bootstrap_key;
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | dpp_hostapd.c | 1104 bi->pubkey = pkex->peer_bootstrap_key; 1151 bi->pubkey = pkex->peer_bootstrap_key;
|
/external/boringssl/include/openssl/ |
H A D | x509.h | 196 X509_PUBKEY *pubkey; member in struct:X509_req_info_st 484 X509_PUBKEY *pubkey; member in struct:Netscape_spkac_st
|
/external/boringssl/src/include/openssl/ |
H A D | x509.h | 196 X509_PUBKEY *pubkey; member in struct:X509_req_info_st 484 X509_PUBKEY *pubkey; member in struct:Netscape_spkac_st
|
/external/wpa_supplicant_8/hostapd/src/wps/ |
H A D | wps_er.c | 2083 const u8 *addr, struct wpabuf *pubkey) 2102 return wps_build_nfc_handover_sel(wps, pubkey, addr, 0); 2081 wps_er_nfc_handover_sel(struct wps_er *er, struct wps_context *wps, const u8 *uuid, const u8 *addr, struct wpabuf *pubkey) argument
|
/external/wpa_supplicant_8/src/wps/ |
H A D | wps_er.c | 2083 const u8 *addr, struct wpabuf *pubkey) 2102 return wps_build_nfc_handover_sel(wps, pubkey, addr, 0); 2081 wps_er_nfc_handover_sel(struct wps_er *er, struct wps_context *wps, const u8 *uuid, const u8 *addr, struct wpabuf *pubkey) argument
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | dpp_supplicant.c | 1487 bi->pubkey = pkex->peer_bootstrap_key; 1534 bi->pubkey = pkex->peer_bootstrap_key;
|
/external/wpa_supplicant_8/wpa_supplicant/src/wps/ |
H A D | wps_er.c | 2083 const u8 *addr, struct wpabuf *pubkey) 2102 return wps_build_nfc_handover_sel(wps, pubkey, addr, 0); 2081 wps_er_nfc_handover_sel(struct wps_er *er, struct wps_context *wps, const u8 *uuid, const u8 *addr, struct wpabuf *pubkey) argument
|
/external/curl/src/ |
H A D | tool_getparam.c | 226 {"Eh", "pubkey", ARG_STRING}, 1456 case 'h': /* --pubkey public key file */ 1457 GetStr(&config->pubkey, nextarg);
|
H A D | tool_operate.c | 1083 my_setopt_str(curl, CURLOPT_SSH_PUBLIC_KEYFILE, config->pubkey);
|
/external/libmtp/src/ |
H A D | mtpz.c | 199 gcry_sexp_t pubkey; member in struct:mtpz_rsa_struct 284 gcry_sexp_build(&rsa->pubkey, NULL, "(public-key (rsa (n %m) (e %m)))", mpi_modulus, mpi_pubexp); 296 gcry_sexp_release(rsa->pubkey);
|
/external/boringssl/src/ssl/ |
H A D | internal.h | 2694 // ssl_compare_public_and_private_key returns one if |pubkey| is the public 2697 int ssl_compare_public_and_private_key(const EVP_PKEY *pubkey,
|
/external/google-tv-pairing-protocol/java/jar/ |
H A D | bcprov-jdk15-143.jar | META-INF/MANIFEST.MF META-INF/BCKEY.SF META-INF/BCKEY.DSA META ... |
/external/robolectric/v3/runtime/ |
H A D | android-all-4.3_r2-robolectric-0.jar | META-INF/ META-INF/MANIFEST.MF android/ android/accessibilityservice/ android/accessibilityservice/AccessibilityService$1.class ... |
H A D | android-all-4.4_r1-robolectric-1.jar | META-INF/ META-INF/MANIFEST.MF com/ com/google/ com/google/android/ com/google/android/collect/ ... |
H A D | android-all-5.0.0_r2-robolectric-1.jar | META-INF/ META-INF/MANIFEST.MF com/ com/google/ com/google/android/ com/google/android/collect/ ... |
H A D | android-all-5.1.1_r9-robolectric-1.jar | META-INF/ META-INF/MANIFEST.MF com/ com/google/ com/google/android/ com/google/android/collect/ ... |