/external/vboot_reference/futility/ |
D | cmd_vbutil_key.c | 73 VbPublicKey *pubkey; in Pack() local 81 pubkey = PublicKeyReadKeyb(infile, algorithm, version); in Pack() 82 if (pubkey) { in Pack() 83 if (0 != PublicKeyWrite(outfile, pubkey)) { in Pack() 87 free(pubkey); in Pack() 108 VbPublicKey *pubkey; in Unpack() local 116 pubkey = PublicKeyRead(infile); in Unpack() 117 if (pubkey) { in Unpack() 119 printf("Algorithm: %" PRIu64 " %s\n", pubkey->algorithm, in Unpack() 120 (pubkey->algorithm < kNumAlgorithms ? in Unpack() [all …]
|
D | cmd_create.c | 80 VbPublicKey *pubkey = 0; in vb1_make_keypair() local 136 pubkey = PublicKeyAlloc(keyb_size, vb1_algorithm, opt_version); in vb1_make_keypair() 137 if (!pubkey) in vb1_make_keypair() 139 memcpy(GetPublicKeyData(pubkey), keyb_data, keyb_size); in vb1_make_keypair() 143 if (0 != PublicKeyWrite(outfile, pubkey)) { in vb1_make_keypair() 153 free(pubkey); in vb1_make_keypair() 162 struct vb2_public_key *pubkey = 0; in vb2_make_keypair() local 216 if (vb2_public_key_alloc(&pubkey, sig_alg)) { in vb2_make_keypair() 231 pubkey_buf = vb2_public_key_packed_data(pubkey); in vb2_make_keypair() 235 if (vb2_unpack_key_data(pubkey, pubkey_buf, keyb_size)) { in vb2_make_keypair() [all …]
|
D | cmd_show.c | 47 static void show_key(VbPublicKey *pubkey, const char *sp) in show_key() argument 49 printf("%sAlgorithm: %" PRIu64 " %s\n", sp, pubkey->algorithm, in show_key() 50 (pubkey->algorithm < kNumAlgorithms ? in show_key() 51 algo_strings[pubkey->algorithm] : "(invalid)")); in show_key() 52 printf("%sKey Version: %" PRIu64 "\n", sp, pubkey->key_version); in show_key() 54 PrintPubKeySha1Sum(pubkey); in show_key() 94 VbPublicKey *pubkey = (VbPublicKey *)state->my_area->buf; in futil_cb_show_pubkey() local 96 if (!PublicKeyLooksOkay(pubkey, state->my_area->len)) { in futil_cb_show_pubkey() 102 show_key(pubkey, " "); in futil_cb_show_pubkey() 131 VbPublicKey *pubkey; in futil_cb_show_gbb() local [all …]
|
/external/conscrypt/src/main/java/org/conscrypt/ |
D | ChainStrengthAnalyzer.java | 52 Object pubkey = cert.getPublicKey(); in checkKeyLength() local 53 if (pubkey instanceof RSAPublicKey) { in checkKeyLength() 54 int modulusLength = ((RSAPublicKey) pubkey).getModulus().bitLength(); in checkKeyLength() 59 } else if (pubkey instanceof ECPublicKey) { in checkKeyLength() 61 ((ECPublicKey) pubkey).getParams().getCurve().getField().getFieldSize(); in checkKeyLength() 66 } else if (pubkey instanceof DSAPublicKey) { in checkKeyLength() 67 int pLength = ((DSAPublicKey) pubkey).getParams().getP().bitLength(); in checkKeyLength() 68 int qLength = ((DSAPublicKey) pubkey).getParams().getQ().bitLength(); in checkKeyLength() 76 … throw new CertificateException("Rejecting unknown key class " + pubkey.getClass().getName()); in checkKeyLength()
|
/external/wpa_supplicant_8/src/wps/ |
D | wps_attr_build.c | 23 struct wpabuf *pubkey; in wps_build_public_key() local 39 pubkey = wpabuf_dup(wps->wps->dh_pubkey); in wps_build_public_key() 62 pubkey = wpabuf_dup(wps->wps->ap_nfc_dh_pubkey); in wps_build_public_key() 63 wps->dh_ctx = dh5_init_fixed(wps->dh_privkey, pubkey); in wps_build_public_key() 68 wps->dh_ctx = dh5_init(&wps->dh_privkey, &pubkey); in wps_build_public_key() 69 pubkey = wpabuf_zeropad(pubkey, 192); in wps_build_public_key() 71 if (wps->dh_ctx == NULL || wps->dh_privkey == NULL || pubkey == NULL) { in wps_build_public_key() 74 wpabuf_free(pubkey); in wps_build_public_key() 78 wpa_hexdump_buf(MSG_DEBUG, "WPS: DH own Public Key", pubkey); in wps_build_public_key() 81 wpabuf_put_be16(msg, wpabuf_len(pubkey)); in wps_build_public_key() [all …]
|
D | wps_common.c | 64 struct wpabuf *pubkey, *dh_shared; in wps_derive_keys() local 75 pubkey = wps->registrar ? wps->dh_pubkey_e : wps->dh_pubkey_r; in wps_derive_keys() 76 if (pubkey == NULL) { in wps_derive_keys() 82 wpa_hexdump_buf(MSG_DEBUG, "WPS: DH peer Public Key", pubkey); in wps_derive_keys() 83 dh_shared = dh5_derive_shared(wps->dh_ctx, pubkey, wps->dh_privkey); in wps_derive_keys() 412 const struct wpabuf *pubkey, in wps_build_nfc_pw_token() argument 421 if (wps_build_oob_dev_pw(data, dev_pw_id, pubkey, in wps_build_nfc_pw_token() 623 struct wpabuf * wps_nfc_token_build(int ndef, int id, struct wpabuf *pubkey, in wps_nfc_token_build() argument 628 if (pubkey == NULL || dev_pw == NULL) in wps_nfc_token_build() 631 ret = wps_build_nfc_pw_token(id, pubkey, dev_pw); in wps_nfc_token_build() [all …]
|
D | wps.h | 861 const u8 *addr, struct wpabuf *pubkey); 869 const struct wpabuf *pubkey, 871 struct wpabuf * wps_nfc_token_build(int ndef, int id, struct wpabuf *pubkey, 873 int wps_nfc_gen_dh(struct wpabuf **pubkey, struct wpabuf **privkey); 874 struct wpabuf * wps_nfc_token_gen(int ndef, int *id, struct wpabuf **pubkey,
|
/external/v8/tools/testrunner/server/ |
D | status_handler.py | 57 for pubkey in pubkey_list: 58 if server.IsTrusted(pubkey): continue 59 result = _StatusQuery(peer, [constants.GET_SIGNED_PUBKEY, pubkey]) 71 def TryTransitiveTrust(peer, pubkey, server): argument 72 if _StatusQuery(peer, [constants.DO_YOU_TRUST, pubkey]): 73 result = _StatusQuery(peer, [constants.GET_SIGNED_PUBKEY, pubkey])
|
D | main.py | 141 if self.IsTrusted(p.pubkey): 147 status_handler.TryTransitiveTrust(p2, p.pubkey, self) 189 if peer.pubkey == fingerprint: 218 pubkey = data[1] 227 if not signatures.VerifySignature(filename, pubkey, signature,
|
/external/vboot_reference/utility/ |
D | dumpRSAPublicKey.c | 140 RSA* pubkey = NULL; in main() local 175 if (!(pubkey = EVP_PKEY_get1_RSA(key))) { in main() 181 if (!(pubkey = PEM_read_RSA_PUBKEY(fp, NULL, NULL, NULL))) { in main() 187 if (check(pubkey)) { in main() 188 output(pubkey); in main() 193 RSA_free(pubkey); in main()
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/netscape/ |
D | NetscapeCertRequest.java | 53 PublicKey pubkey ; field in NetscapeCertRequest 120 pubkey = KeyFactory.getInstance(keyAlg.getObjectId().getId(), "BC") in NetscapeCertRequest() 139 pubkey = pub_key; in NetscapeCertRequest() 188 return pubkey; in getPublicKey() 193 pubkey = value; in setPublicKey() 210 sig.initVerify(pubkey); in verify() 266 baos.write(pubkey.getEncoded()); in getKeySpec()
|
/external/v8/tools/testrunner/objects/ |
D | workpacket.py | 34 base_revision=None, patch=None, pubkey=None): argument 41 self.pubkey_fingerprint = pubkey 90 pubkey=pubkey_fingerprint)
|
D | peer.py | 30 def __init__(self, address, jobs, rel_perf, pubkey): argument 34 self.pubkey = pubkey # string: pubkey's fingerprint
|
/external/boringssl/src/crypto/x509/ |
D | x509spki.c | 66 return(X509_PUBKEY_set(&(x->spkac->pubkey),pkey)); in NETSCAPE_SPKI_set_pubkey() 73 return(X509_PUBKEY_get(x->spkac->pubkey)); in NETSCAPE_SPKI_get_pubkey()
|
D | x_spki.c | 66 ASN1_SIMPLE(NETSCAPE_SPKAC, pubkey, X509_PUBKEY),
|
D | x509rset.c | 78 return(X509_PUBKEY_set(&x->req_info->pubkey,pkey)); in X509_REQ_set_pubkey()
|
D | x_req.c | 96 ASN1_SIMPLE(X509_REQ_INFO, pubkey, X509_PUBKEY),
|
D | x_pubkey.c | 76 X509_PUBKEY *pubkey = (X509_PUBKEY *)*pval; in pubkey_cb() local 77 EVP_PKEY_free(pubkey->pkey); in pubkey_cb()
|
/external/v8/tools/testrunner/network/ |
D | network_execution.py | 105 pubkey = data[1] 106 if not pubkey: raise RuntimeError("Received empty public key") 107 self.pubkey_fingerprint = pubkey 181 pubkey=self.pubkey_fingerprint)
|
/external/boringssl/src/crypto/evp/ |
D | p_ec.c | 171 const EC_POINT *pubkey = NULL; in pkey_ec_derive() local 187 pubkey = EC_KEY_get0_public_key(ctx->peerkey->pkey.ec); in pkey_ec_derive() 194 ret = ECDH_compute_key(key, outlen, pubkey, eckey, 0); in pkey_ec_derive()
|
/external/openssh/ |
D | ssh_api.c | 174 struct sshkey *pubkey = NULL; in ssh_add_hostkey() local 179 if ((r = sshkey_from_private(key, &pubkey)) != 0) in ssh_add_hostkey() 184 sshkey_free(pubkey); in ssh_add_hostkey() 191 k->key = pubkey; in ssh_add_hostkey() 532 _ssh_host_key_sign(struct sshkey *privkey, struct sshkey *pubkey, in _ssh_host_key_sign() argument
|
D | sshd.c | 1462 Key *pubkey; local 1778 pubkey = key_load_public(options.host_key_files[i], NULL); 1779 if (pubkey == NULL && key != NULL) 1780 pubkey = key_demote(key); 1782 sensitive_data.host_pubkeys[i] = pubkey; 1784 if (key == NULL && pubkey != NULL && pubkey->type != KEY_RSA1 && 1788 keytype = pubkey->type; 1812 if ((fp = sshkey_fingerprint(pubkey, options.fingerprint_hash, 1817 sshkey_type(pubkey) : sshkey_ssh_name(pubkey), fp); 2502 sshd_hostkey_sign(Key *privkey, Key *pubkey, u_char **signature, size_t *slen, argument [all …]
|
/external/vboot_reference/scripts/keygeneration/ |
D | common.sh | 100 local pubkey=$3 109 --datapubkey "${pubkey}.vbpubk" \
|
/external/boringssl/src/crypto/x509v3/ |
D | v3_skey.c | 127 pk = ctx->subject_req->req_info->pubkey->public_key; in s2i_skey_id()
|
/external/wpa_supplicant_8/src/crypto/ |
D | crypto_openssl.c | 533 struct wpabuf *pubkey = NULL, *privkey = NULL; in dh5_init() local 555 pubkey = wpabuf_alloc(publen); in dh5_init() 556 if (pubkey == NULL) in dh5_init() 563 BN_bn2bin(dh->pub_key, wpabuf_put(pubkey, publen)); in dh5_init() 567 *publ = pubkey; in dh5_init() 571 wpabuf_clear_free(pubkey); in dh5_init()
|