/external/vboot_reference/futility/ |
D | cmd_vbutil_key.c | 73 VbPublicKey *pubkey; in Pack() local 81 pubkey = PublicKeyReadKeyb(infile, algorithm, version); in Pack() 82 if (pubkey) { in Pack() 83 if (0 != PublicKeyWrite(outfile, pubkey)) { in Pack() 87 free(pubkey); in Pack() 108 VbPublicKey *pubkey; in Unpack() local 116 pubkey = PublicKeyRead(infile); in Unpack() 117 if (pubkey) { in Unpack() 119 printf("Algorithm: %" PRIu64 " %s\n", pubkey->algorithm, in Unpack() 120 (pubkey->algorithm < kNumAlgorithms ? in Unpack() [all …]
|
D | cmd_create.c | 80 VbPublicKey *pubkey = 0; in vb1_make_keypair() local 136 pubkey = PublicKeyAlloc(keyb_size, vb1_algorithm, opt_version); in vb1_make_keypair() 137 if (!pubkey) in vb1_make_keypair() 139 memcpy(GetPublicKeyData(pubkey), keyb_data, keyb_size); in vb1_make_keypair() 143 if (0 != PublicKeyWrite(outfile, pubkey)) { in vb1_make_keypair() 153 free(pubkey); in vb1_make_keypair() 162 struct vb2_public_key *pubkey = 0; in vb2_make_keypair() local 216 if (vb2_public_key_alloc(&pubkey, sig_alg)) { in vb2_make_keypair() 231 pubkey_buf = vb2_public_key_packed_data(pubkey); in vb2_make_keypair() 235 if (vb2_unpack_key_data(pubkey, pubkey_buf, keyb_size)) { in vb2_make_keypair() [all …]
|
D | cmd_show.c | 47 static void show_key(VbPublicKey *pubkey, const char *sp) in show_key() argument 49 printf("%sAlgorithm: %" PRIu64 " %s\n", sp, pubkey->algorithm, in show_key() 50 (pubkey->algorithm < kNumAlgorithms ? in show_key() 51 algo_strings[pubkey->algorithm] : "(invalid)")); in show_key() 52 printf("%sKey Version: %" PRIu64 "\n", sp, pubkey->key_version); in show_key() 54 PrintPubKeySha1Sum(pubkey); in show_key() 94 VbPublicKey *pubkey = (VbPublicKey *)state->my_area->buf; in futil_cb_show_pubkey() local 96 if (!PublicKeyLooksOkay(pubkey, state->my_area->len)) { in futil_cb_show_pubkey() 102 show_key(pubkey, " "); in futil_cb_show_pubkey() 131 VbPublicKey *pubkey; in futil_cb_show_gbb() local [all …]
|
/external/syslinux/gpxe/src/crypto/ |
D | x509.c | 50 struct asn1_cursor *pubkey ) { in x509_public_key() argument 81 memcpy ( pubkey, &cursor, sizeof ( *pubkey ) ); in x509_public_key() 82 rc = ( asn1_skip ( pubkey, ASN1_SEQUENCE ), /* algorithm */ in x509_public_key() 83 asn1_enter ( pubkey, ASN1_BIT_STRING ) /* subjectPublicKey*/ ); in x509_public_key() 107 struct asn1_cursor pubkey; in x509_rsa_public_key() local 114 &pubkey ) ) != 0 ) in x509_rsa_public_key() 135 if ( ( pubkey.len < 1 ) || in x509_rsa_public_key() 136 ( ( *( uint8_t * ) pubkey.data ) != 0 ) ) { in x509_rsa_public_key() 141 pubkey.data++; in x509_rsa_public_key() 142 pubkey.len--; in x509_rsa_public_key() [all …]
|
/external/scapy/scapy/layers/tls/ |
D | keyexchange_tls13.py | 45 self.pubkey = None 67 pubkey = privkey.public_key() 68 self.key_exchange = pubkey.public_numbers().y 74 pubkey = privkey.public_key() 75 self.key_exchange = pubkey.public_bytes() 80 pubkey = privkey.public_key() 81 self.key_exchange = pubkey.public_numbers().encode_point() 106 self.pubkey = public_numbers.public_key(default_backend()) 111 self.pubkey = import_point(self.key_exchange) 116 self.pubkey = public_numbers.public_key(default_backend()) [all …]
|
D | cert.py | 209 pubkey = spki.subjectPublicKey 210 if isinstance(pubkey, RSAPublicKey): 212 obj.import_from_asn1pkt(pubkey) 213 elif isinstance(pubkey, ECDSAPublicKey): 224 pubkey = RSAPublicKey(obj.der) 226 obj.import_from_asn1pkt(pubkey) 265 self.pubkey = private_key.public_key() 271 self.pubkey = pubNum.public_key(default_backend()) 273 pubNum = self.pubkey.public_numbers() 287 self.pem = self.pubkey.public_bytes( [all …]
|
D | keyexchange.py | 123 sig_len = s.client_certs[0].pubKey.pubkey.key_size // 8 326 pubkey = s.server_kx_privkey.public_key() 327 y = pubkey.public_numbers().y 328 self.dh_Ys = pkcs_i2osp(y, pubkey.key_size//8) 570 pubkey = s.server_kx_privkey.public_key() 571 self.point = pubkey.public_numbers().encode_point() 643 pubNum = k.pubkey.public_numbers() 646 self.rsamod = pkcs_i2osp(pubNum.n, k.pubkey.key_size//8) 723 pubkey = s.client_kx_privkey.public_key() 724 y = pubkey.public_numbers().y [all …]
|
/external/conscrypt/platform/src/main/java/org/conscrypt/ |
D | ChainStrengthAnalyzer.java | 75 Object pubkey = cert.getPublicKey(); in checkKeyLength() local 76 if (pubkey instanceof RSAPublicKey) { in checkKeyLength() 77 int modulusLength = ((RSAPublicKey) pubkey).getModulus().bitLength(); in checkKeyLength() 82 } else if (pubkey instanceof ECPublicKey) { in checkKeyLength() 84 ((ECPublicKey) pubkey).getParams().getCurve().getField().getFieldSize(); in checkKeyLength() 89 } else if (pubkey instanceof DSAPublicKey) { in checkKeyLength() 90 int pLength = ((DSAPublicKey) pubkey).getParams().getP().bitLength(); in checkKeyLength() 91 int qLength = ((DSAPublicKey) pubkey).getParams().getQ().bitLength(); in checkKeyLength() 99 … throw new CertificateException("Rejecting unknown key class " + pubkey.getClass().getName()); in checkKeyLength()
|
/external/wpa_supplicant_8/src/wps/ |
D | wps_attr_build.c | 23 struct wpabuf *pubkey = NULL; in wps_build_public_key() local 39 pubkey = wpabuf_dup(wps->wps->dh_pubkey); in wps_build_public_key() 62 pubkey = wpabuf_dup(wps->wps->ap_nfc_dh_pubkey); in wps_build_public_key() 63 wps->dh_ctx = dh5_init_fixed(wps->dh_privkey, pubkey); in wps_build_public_key() 68 wps->dh_ctx = dh5_init(&wps->dh_privkey, &pubkey); in wps_build_public_key() 69 pubkey = wpabuf_zeropad(pubkey, 192); in wps_build_public_key() 71 if (wps->dh_ctx == NULL || wps->dh_privkey == NULL || pubkey == NULL) { in wps_build_public_key() 74 wpabuf_free(pubkey); in wps_build_public_key() 78 wpa_hexdump_buf(MSG_DEBUG, "WPS: DH own Public Key", pubkey); in wps_build_public_key() 81 wpabuf_put_be16(msg, wpabuf_len(pubkey)); in wps_build_public_key() [all …]
|
D | wps_common.c | 64 struct wpabuf *pubkey, *dh_shared; in wps_derive_keys() local 75 pubkey = wps->registrar ? wps->dh_pubkey_e : wps->dh_pubkey_r; in wps_derive_keys() 76 if (pubkey == NULL) { in wps_derive_keys() 82 wpa_hexdump_buf(MSG_DEBUG, "WPS: DH peer Public Key", pubkey); in wps_derive_keys() 83 dh_shared = dh5_derive_shared(wps->dh_ctx, pubkey, wps->dh_privkey); in wps_derive_keys() 413 const struct wpabuf *pubkey, in wps_build_nfc_pw_token() argument 422 if (wps_build_oob_dev_pw(data, dev_pw_id, pubkey, in wps_build_nfc_pw_token() 624 struct wpabuf * wps_nfc_token_build(int ndef, int id, struct wpabuf *pubkey, in wps_nfc_token_build() argument 629 if (pubkey == NULL || dev_pw == NULL) in wps_nfc_token_build() 632 ret = wps_build_nfc_pw_token(id, pubkey, dev_pw); in wps_nfc_token_build() [all …]
|
/external/v8/tools/testrunner/server/ |
D | status_handler.py | 57 for pubkey in pubkey_list: 58 if server.IsTrusted(pubkey): continue 59 result = _StatusQuery(peer, [constants.GET_SIGNED_PUBKEY, pubkey]) 71 def TryTransitiveTrust(peer, pubkey, server): argument 72 if _StatusQuery(peer, [constants.DO_YOU_TRUST, pubkey]): 73 result = _StatusQuery(peer, [constants.GET_SIGNED_PUBKEY, pubkey])
|
D | main.py | 141 if self.IsTrusted(p.pubkey): 147 status_handler.TryTransitiveTrust(p2, p.pubkey, self) 189 if peer.pubkey == fingerprint: 218 pubkey = data[1] 227 if not signatures.VerifySignature(filename, pubkey, signature,
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/netscape/ |
D | NetscapeCertRequest.java | 53 PublicKey pubkey ; field in NetscapeCertRequest 118 pubkey = KeyFactory.getInstance(keyAlg.getAlgorithm().getId(), "BC") in NetscapeCertRequest() 137 pubkey = pub_key; in NetscapeCertRequest() 186 return pubkey; in getPublicKey() 191 pubkey = value; in setPublicKey() 208 sig.initVerify(pubkey); in verify() 264 baos.write(pubkey.getEncoded()); in getKeySpec()
|
/external/vboot_reference/utility/ |
D | dumpRSAPublicKey.c | 140 RSA* pubkey = NULL; in main() local 175 if (!(pubkey = EVP_PKEY_get1_RSA(key))) { in main() 181 if (!(pubkey = PEM_read_RSA_PUBKEY(fp, NULL, NULL, NULL))) { in main() 187 if (check(pubkey)) { in main() 188 output(pubkey); in main() 193 RSA_free(pubkey); in main()
|
/external/boringssl/src/ssl/ |
D | ssl_cert.cc | 261 UniquePtr<EVP_PKEY> pubkey = ssl_cert_parse_pubkey(&cert_cbs); in check_leaf_cert_and_privkey() local 262 if (!pubkey) { in check_leaf_cert_and_privkey() 267 if (!ssl_is_key_type_supported(pubkey->type)) { in check_leaf_cert_and_privkey() 274 if (pubkey->type == EVP_PKEY_EC && in check_leaf_cert_and_privkey() 282 !ssl_compare_public_and_private_key(pubkey.get(), privkey)) { in check_leaf_cert_and_privkey() 409 UniquePtr<EVP_PKEY> pubkey; in ssl_parse_cert_chain() local 420 pubkey = ssl_cert_parse_pubkey(&certificate); in ssl_parse_cert_chain() 421 if (!pubkey) { in ssl_parse_cert_chain() 443 *out_pubkey = std::move(pubkey); in ssl_parse_cert_chain() 529 int ssl_compare_public_and_private_key(const EVP_PKEY *pubkey, in ssl_compare_public_and_private_key() argument [all …]
|
/external/boringssl/src/crypto/x509/ |
D | x509_r2x.c | 71 EVP_PKEY *pubkey = NULL; in X509_REQ_to_X509() local 105 pubkey = X509_REQ_get_pubkey(r); in X509_REQ_to_X509() 106 res = X509_set_pubkey(ret, pubkey); in X509_REQ_to_X509() 107 EVP_PKEY_free(pubkey); in X509_REQ_to_X509()
|
/external/autotest/client/site_tests/login_OwnershipRetaken/ |
D | login_OwnershipRetaken.py | 41 pubkey = ownership.known_pubkey() 53 pubkey, 58 if (utils.read_file(constants.OWNER_KEY_FILE) != pubkey): 72 if (utils.read_file(constants.OWNER_KEY_FILE) == pubkey):
|
/external/boringssl/src/crypto/evp/ |
D | evp_extra_test.cc | 575 bssl::UniquePtr<EVP_PKEY> pubkey(EVP_PKEY_new_ed25519_public(kPublicKey)); in TEST() local 576 ASSERT_TRUE(pubkey); in TEST() 577 EXPECT_EQ(EVP_PKEY_ED25519, EVP_PKEY_id(pubkey.get())); in TEST() 584 ASSERT_TRUE(EVP_marshal_public_key(cbb.get(), pubkey.get())); in TEST() 591 EXPECT_FALSE(EVP_marshal_private_key(cbb.get(), pubkey.get())); in TEST() 617 EXPECT_EQ(1, EVP_PKEY_cmp(pubkey.get(), privkey.get())); in TEST() 622 EXPECT_EQ(0, EVP_PKEY_cmp(pubkey.get(), pubkey2.get())); in TEST()
|
D | p_ed25519_asn1.c | 31 static int set_pubkey(EVP_PKEY *pkey, const uint8_t pubkey[32]) { in set_pubkey() 38 OPENSSL_memcpy(key->key.pub.value, pubkey, 32); in set_pubkey() 114 uint8_t pubkey[32], privkey[64]; in ed25519_priv_decode() local 115 ED25519_keypair_from_seed(pubkey, privkey, CBS_data(&inner)); in ed25519_priv_decode()
|
D | p_ec.c | 146 const EC_POINT *pubkey = NULL; in pkey_ec_derive() local 162 pubkey = EC_KEY_get0_public_key(ctx->peerkey->pkey.ec); in pkey_ec_derive() 169 ret = ECDH_compute_key(key, outlen, pubkey, eckey, 0); in pkey_ec_derive()
|
/external/v8/tools/testrunner/objects/ |
D | workpacket.py | 34 base_revision=None, patch=None, pubkey=None): argument 41 self.pubkey_fingerprint = pubkey 90 pubkey=pubkey_fingerprint)
|
D | peer.py | 30 def __init__(self, address, jobs, rel_perf, pubkey): argument 34 self.pubkey = pubkey # string: pubkey's fingerprint
|
/external/curl/lib/vtls/ |
D | cyassl.c | 542 curl_asn1Element *pubkey; in cyassl_connect_step2() local 561 pubkey = &x509_parsed.subjectPublicKeyInfo; in cyassl_connect_step2() 562 if(!pubkey->header || pubkey->end <= pubkey->header) { in cyassl_connect_step2() 569 (const unsigned char *)pubkey->header, in cyassl_connect_step2() 570 (size_t)(pubkey->end - pubkey->header)); in cyassl_connect_step2()
|
/external/autotest/client/common_lib/cros/ |
D | policy.py | 115 def generate_policy(proto_binding_location, key, pubkey, policy, old_key=None): argument 144 policy_proto.new_public_key = pubkey 145 policy_proto.new_public_key_signature = ownership.sign(old_key, pubkey)
|
/external/wpa_supplicant_8/src/crypto/ |
D | crypto_openssl.c | 646 struct wpabuf *pubkey = NULL, *privkey = NULL; in dh5_init() local 669 pubkey = wpabuf_alloc(publen); in dh5_init() 670 if (pubkey == NULL) in dh5_init() 677 BN_bn2bin(dh->pub_key, wpabuf_put(pubkey, publen)); in dh5_init() 681 *publ = pubkey; in dh5_init() 685 wpabuf_clear_free(pubkey); in dh5_init() 691 struct wpabuf *pubkey = NULL, *privkey = NULL; in dh5_init() 717 pubkey = wpabuf_alloc(publen); in dh5_init() 718 if (!pubkey) in dh5_init() 725 BN_bn2bin(pub_key, wpabuf_put(pubkey, publen)); in dh5_init() [all …]
|