/external/conscrypt/platform/src/main/java/org/conscrypt/ |
H A D | ChainStrengthAnalyzer.java | 75 Object pubkey = cert.getPublicKey(); 76 if (pubkey instanceof RSAPublicKey) { 77 int modulusLength = ((RSAPublicKey) pubkey).getModulus().bitLength(); 82 } else if (pubkey instanceof ECPublicKey) { 84 ((ECPublicKey) pubkey).getParams().getCurve().getField().getFieldSize(); 89 } else if (pubkey instanceof DSAPublicKey) { 90 int pLength = ((DSAPublicKey) pubkey).getParams().getP().bitLength(); 91 int qLength = ((DSAPublicKey) pubkey).getParams().getQ().bitLength(); 99 throw new CertificateException("Rejecting unknown key class " + pubkey.getClass().getName());
|
/external/vboot_reference/futility/ |
H A D | cmd_vbutil_key.c | 73 VbPublicKey *pubkey; local 81 pubkey = PublicKeyReadKeyb(infile, algorithm, version); 82 if (pubkey) { 83 if (0 != PublicKeyWrite(outfile, pubkey)) { 87 free(pubkey); 108 VbPublicKey *pubkey; local 116 pubkey = PublicKeyRead(infile); 117 if (pubkey) { 119 printf("Algorithm: %" PRIu64 " %s\n", pubkey->algorithm, 120 (pubkey [all...] |
H A D | cmd_create.c | 80 VbPublicKey *pubkey = 0; local 136 pubkey = PublicKeyAlloc(keyb_size, vb1_algorithm, opt_version); 137 if (!pubkey) 139 memcpy(GetPublicKeyData(pubkey), keyb_data, keyb_size); 143 if (0 != PublicKeyWrite(outfile, pubkey)) { 153 free(pubkey); 162 struct vb2_public_key *pubkey = 0; local 216 if (vb2_public_key_alloc(&pubkey, sig_alg)) { 231 pubkey_buf = vb2_public_key_packed_data(pubkey); 235 if (vb2_unpack_key_data(pubkey, pubkey_bu [all...] |
H A D | cmd_show.c | 47 static void show_key(VbPublicKey *pubkey, const char *sp) argument 49 printf("%sAlgorithm: %" PRIu64 " %s\n", sp, pubkey->algorithm, 50 (pubkey->algorithm < kNumAlgorithms ? 51 algo_strings[pubkey->algorithm] : "(invalid)")); 52 printf("%sKey Version: %" PRIu64 "\n", sp, pubkey->key_version); 54 PrintPubKeySha1Sum(pubkey); 94 VbPublicKey *pubkey = (VbPublicKey *)state->my_area->buf; local 96 if (!PublicKeyLooksOkay(pubkey, state->my_area->len)) { 102 show_key(pubkey, " "); 131 VbPublicKey *pubkey; local [all...] |
/external/syslinux/gpxe/src/crypto/ |
H A D | x509.c | 45 * @v pubkey Public key value to fill in 50 struct asn1_cursor *pubkey ) { 81 memcpy ( pubkey, &cursor, sizeof ( *pubkey ) ); 82 rc = ( asn1_skip ( pubkey, ASN1_SEQUENCE ), /* algorithm */ 83 asn1_enter ( pubkey, ASN1_BIT_STRING ) /* subjectPublicKey*/ ); 107 struct asn1_cursor pubkey; local 114 &pubkey ) ) != 0 ) 135 if ( ( pubkey.len < 1 ) || 136 ( ( *( uint8_t * ) pubkey [all...] |
/external/boringssl/src/crypto/x509/ |
H A D | x509_r2x.c | 71 EVP_PKEY *pubkey = NULL; local 105 pubkey = X509_REQ_get_pubkey(r); 106 res = X509_set_pubkey(ret, pubkey); 107 EVP_PKEY_free(pubkey);
|
H A D | x_spki.c | 68 ASN1_SIMPLE(NETSCAPE_SPKAC, pubkey, X509_PUBKEY),
|
H A D | x509rset.c | 80 return (X509_PUBKEY_set(&x->req_info->pubkey, pkey));
|
H A D | x_req.c | 92 ASN1_SIMPLE(X509_REQ_INFO, pubkey, X509_PUBKEY),
|
H A D | x509spki.c | 68 return (X509_PUBKEY_set(&(x->spkac->pubkey), pkey)); 75 return (X509_PUBKEY_get(x->spkac->pubkey));
|
/external/v8/tools/testrunner/server/ |
H A D | status_handler.py | 57 for pubkey in pubkey_list: 58 if server.IsTrusted(pubkey): continue 59 result = _StatusQuery(peer, [constants.GET_SIGNED_PUBKEY, pubkey]) 71 def TryTransitiveTrust(peer, pubkey, server): 72 if _StatusQuery(peer, [constants.DO_YOU_TRUST, pubkey]): 73 result = _StatusQuery(peer, [constants.GET_SIGNED_PUBKEY, pubkey])
|
/external/scapy/scapy/layers/tls/ |
H A D | keyexchange_tls13.py | 36 __slots__ = ["privkey", "pubkey"] 45 self.pubkey = None 67 pubkey = privkey.public_key() 68 self.key_exchange = pubkey.public_numbers().y 74 pubkey = privkey.public_key() 75 self.key_exchange = pubkey.public_bytes() 80 pubkey = privkey.public_key() 81 self.key_exchange = pubkey.public_numbers().encode_point() 106 self.pubkey = public_numbers.public_key(default_backend()) 111 self.pubkey [all...] |
H A D | cert.py | 209 pubkey = spki.subjectPublicKey 210 if isinstance(pubkey, RSAPublicKey): 212 obj.import_from_asn1pkt(pubkey) 213 elif isinstance(pubkey, ECDSAPublicKey): 224 pubkey = RSAPublicKey(obj.der) 226 obj.import_from_asn1pkt(pubkey) 265 self.pubkey = private_key.public_key() 271 self.pubkey = pubNum.public_key(default_backend()) 273 pubNum = self.pubkey.public_numbers() 287 self.pem = self.pubkey [all...] |
/external/v8/tools/testrunner/objects/ |
H A D | workpacket.py | 34 base_revision=None, patch=None, pubkey=None): 41 self.pubkey_fingerprint = pubkey 69 "pubkey": self.pubkey_fingerprint, 83 pubkey_fingerprint = packed["pubkey"] 90 pubkey=pubkey_fingerprint)
|
H A D | peer.py | 30 def __init__(self, address, jobs, rel_perf, pubkey): 34 self.pubkey = pubkey # string: pubkey's fingerprint
|
/external/wpa_supplicant_8/hostapd/src/wps/ |
H A D | wps_attr_build.c | 23 struct wpabuf *pubkey = NULL; local 39 pubkey = wpabuf_dup(wps->wps->dh_pubkey); 62 pubkey = wpabuf_dup(wps->wps->ap_nfc_dh_pubkey); 63 wps->dh_ctx = dh5_init_fixed(wps->dh_privkey, pubkey); 68 wps->dh_ctx = dh5_init(&wps->dh_privkey, &pubkey); 69 pubkey = wpabuf_zeropad(pubkey, 192); 71 if (wps->dh_ctx == NULL || wps->dh_privkey == NULL || pubkey == NULL) { 74 wpabuf_free(pubkey); 78 wpa_hexdump_buf(MSG_DEBUG, "WPS: DH own Public Key", pubkey); 404 wps_build_oob_dev_pw(struct wpabuf *msg, u16 dev_pw_id, const struct wpabuf *pubkey, const u8 *dev_pw, size_t dev_pw_len) argument [all...] |
/external/wpa_supplicant_8/src/wps/ |
H A D | wps_attr_build.c | 23 struct wpabuf *pubkey = NULL; local 39 pubkey = wpabuf_dup(wps->wps->dh_pubkey); 62 pubkey = wpabuf_dup(wps->wps->ap_nfc_dh_pubkey); 63 wps->dh_ctx = dh5_init_fixed(wps->dh_privkey, pubkey); 68 wps->dh_ctx = dh5_init(&wps->dh_privkey, &pubkey); 69 pubkey = wpabuf_zeropad(pubkey, 192); 71 if (wps->dh_ctx == NULL || wps->dh_privkey == NULL || pubkey == NULL) { 74 wpabuf_free(pubkey); 78 wpa_hexdump_buf(MSG_DEBUG, "WPS: DH own Public Key", pubkey); 404 wps_build_oob_dev_pw(struct wpabuf *msg, u16 dev_pw_id, const struct wpabuf *pubkey, const u8 *dev_pw, size_t dev_pw_len) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/wps/ |
H A D | wps_attr_build.c | 23 struct wpabuf *pubkey = NULL; local 39 pubkey = wpabuf_dup(wps->wps->dh_pubkey); 62 pubkey = wpabuf_dup(wps->wps->ap_nfc_dh_pubkey); 63 wps->dh_ctx = dh5_init_fixed(wps->dh_privkey, pubkey); 68 wps->dh_ctx = dh5_init(&wps->dh_privkey, &pubkey); 69 pubkey = wpabuf_zeropad(pubkey, 192); 71 if (wps->dh_ctx == NULL || wps->dh_privkey == NULL || pubkey == NULL) { 74 wpabuf_free(pubkey); 78 wpa_hexdump_buf(MSG_DEBUG, "WPS: DH own Public Key", pubkey); 404 wps_build_oob_dev_pw(struct wpabuf *msg, u16 dev_pw_id, const struct wpabuf *pubkey, const u8 *dev_pw, size_t dev_pw_len) argument [all...] |
/external/vboot_reference/utility/ |
H A D | dumpRSAPublicKey.c | 140 RSA* pubkey = NULL; local 175 if (!(pubkey = EVP_PKEY_get1_RSA(key))) { 180 /* Read the pubkey in .PEM format. */ 181 if (!(pubkey = PEM_read_RSA_PUBKEY(fp, NULL, NULL, NULL))) { 187 if (check(pubkey)) { 188 output(pubkey); 193 RSA_free(pubkey);
|
/external/autotest/client/site_tests/login_OwnershipRetaken/ |
H A D | login_OwnershipRetaken.py | 41 pubkey = ownership.known_pubkey() 53 pubkey, 58 if (utils.read_file(constants.OWNER_KEY_FILE) != pubkey): 72 if (utils.read_file(constants.OWNER_KEY_FILE) == pubkey):
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/netscape/ |
H A D | NetscapeCertRequest.java | 53 PublicKey pubkey ; field in class:NetscapeCertRequest 118 pubkey = KeyFactory.getInstance(keyAlg.getAlgorithm().getId(), "BC") 137 pubkey = pub_key; 141 //content_der.add(new SubjectPublicKeyInfo(sigAlg, new RSAPublicKeyStructure(pubkey.getModulus(), pubkey.getPublicExponent()).getDERObject())); 186 return pubkey; 191 pubkey = value; 208 sig.initVerify(pubkey); 264 baos.write(pubkey.getEncoded());
|
/external/boringssl/src/crypto/evp/ |
H A D | p_ed25519_asn1.c | 31 static int set_pubkey(EVP_PKEY *pkey, const uint8_t pubkey[32]) { argument 38 OPENSSL_memcpy(key->key.pub.value, pubkey, 32); 114 uint8_t pubkey[32], privkey[64]; local 115 ED25519_keypair_from_seed(pubkey, privkey, CBS_data(&inner));
|
H A D | p_ec.c | 146 const EC_POINT *pubkey = NULL; local 162 pubkey = EC_KEY_get0_public_key(ctx->peerkey->pkey.ec); 169 ret = ECDH_compute_key(key, outlen, pubkey, eckey, 0);
|
/external/autotest/client/common_lib/cros/ |
H A D | policy.py | 115 def generate_policy(proto_binding_location, key, pubkey, policy, old_key=None): 119 |key|. Also includes the public key |pubkey|, signed with |old_key| 120 if provided. If not, |pubkey| is signed with |key|. The protobuf 126 @param pubkey: new public key to be signed and embedded in generated 130 is intended to represent a key rotation. pubkey will be 144 policy_proto.new_public_key = pubkey 145 policy_proto.new_public_key_signature = ownership.sign(old_key, pubkey)
|
/external/autotest/client/site_tests/login_OwnershipApi/ |
H A D | login_OwnershipApi.py | 54 pubkey = ownership.known_pubkey() 68 pubkey,
|