Home
last modified time | relevance | path

Searched refs:pubkey (Results 1 – 25 of 128) sorted by relevance

123456

/external/vboot_reference/futility/
Dcmd_vbutil_key.c73 VbPublicKey *pubkey; in Pack() local
81 pubkey = PublicKeyReadKeyb(infile, algorithm, version); in Pack()
82 if (pubkey) { in Pack()
83 if (0 != PublicKeyWrite(outfile, pubkey)) { in Pack()
87 free(pubkey); in Pack()
108 VbPublicKey *pubkey; in Unpack() local
116 pubkey = PublicKeyRead(infile); in Unpack()
117 if (pubkey) { in Unpack()
119 printf("Algorithm: %" PRIu64 " %s\n", pubkey->algorithm, in Unpack()
120 (pubkey->algorithm < kNumAlgorithms ? in Unpack()
[all …]
Dcmd_create.c80 VbPublicKey *pubkey = 0; in vb1_make_keypair() local
136 pubkey = PublicKeyAlloc(keyb_size, vb1_algorithm, opt_version); in vb1_make_keypair()
137 if (!pubkey) in vb1_make_keypair()
139 memcpy(GetPublicKeyData(pubkey), keyb_data, keyb_size); in vb1_make_keypair()
143 if (0 != PublicKeyWrite(outfile, pubkey)) { in vb1_make_keypair()
153 free(pubkey); in vb1_make_keypair()
162 struct vb2_public_key *pubkey = 0; in vb2_make_keypair() local
216 if (vb2_public_key_alloc(&pubkey, sig_alg)) { in vb2_make_keypair()
231 pubkey_buf = vb2_public_key_packed_data(pubkey); in vb2_make_keypair()
235 if (vb2_unpack_key_data(pubkey, pubkey_buf, keyb_size)) { in vb2_make_keypair()
[all …]
Dcmd_show.c47 static void show_key(VbPublicKey *pubkey, const char *sp) in show_key() argument
49 printf("%sAlgorithm: %" PRIu64 " %s\n", sp, pubkey->algorithm, in show_key()
50 (pubkey->algorithm < kNumAlgorithms ? in show_key()
51 algo_strings[pubkey->algorithm] : "(invalid)")); in show_key()
52 printf("%sKey Version: %" PRIu64 "\n", sp, pubkey->key_version); in show_key()
54 PrintPubKeySha1Sum(pubkey); in show_key()
94 VbPublicKey *pubkey = (VbPublicKey *)state->my_area->buf; in futil_cb_show_pubkey() local
96 if (!PublicKeyLooksOkay(pubkey, state->my_area->len)) { in futil_cb_show_pubkey()
102 show_key(pubkey, " "); in futil_cb_show_pubkey()
131 VbPublicKey *pubkey; in futil_cb_show_gbb() local
[all …]
/external/syslinux/gpxe/src/crypto/
Dx509.c50 struct asn1_cursor *pubkey ) { in x509_public_key() argument
81 memcpy ( pubkey, &cursor, sizeof ( *pubkey ) ); in x509_public_key()
82 rc = ( asn1_skip ( pubkey, ASN1_SEQUENCE ), /* algorithm */ in x509_public_key()
83 asn1_enter ( pubkey, ASN1_BIT_STRING ) /* subjectPublicKey*/ ); in x509_public_key()
107 struct asn1_cursor pubkey; in x509_rsa_public_key() local
114 &pubkey ) ) != 0 ) in x509_rsa_public_key()
135 if ( ( pubkey.len < 1 ) || in x509_rsa_public_key()
136 ( ( *( uint8_t * ) pubkey.data ) != 0 ) ) { in x509_rsa_public_key()
141 pubkey.data++; in x509_rsa_public_key()
142 pubkey.len--; in x509_rsa_public_key()
[all …]
/external/scapy/scapy/layers/tls/
Dkeyexchange_tls13.py45 self.pubkey = None
67 pubkey = privkey.public_key()
68 self.key_exchange = pubkey.public_numbers().y
74 pubkey = privkey.public_key()
75 self.key_exchange = pubkey.public_bytes()
80 pubkey = privkey.public_key()
81 self.key_exchange = pubkey.public_numbers().encode_point()
106 self.pubkey = public_numbers.public_key(default_backend())
111 self.pubkey = import_point(self.key_exchange)
116 self.pubkey = public_numbers.public_key(default_backend())
[all …]
Dcert.py209 pubkey = spki.subjectPublicKey
210 if isinstance(pubkey, RSAPublicKey):
212 obj.import_from_asn1pkt(pubkey)
213 elif isinstance(pubkey, ECDSAPublicKey):
224 pubkey = RSAPublicKey(obj.der)
226 obj.import_from_asn1pkt(pubkey)
265 self.pubkey = private_key.public_key()
271 self.pubkey = pubNum.public_key(default_backend())
273 pubNum = self.pubkey.public_numbers()
287 self.pem = self.pubkey.public_bytes(
[all …]
Dkeyexchange.py123 sig_len = s.client_certs[0].pubKey.pubkey.key_size // 8
326 pubkey = s.server_kx_privkey.public_key()
327 y = pubkey.public_numbers().y
328 self.dh_Ys = pkcs_i2osp(y, pubkey.key_size//8)
570 pubkey = s.server_kx_privkey.public_key()
571 self.point = pubkey.public_numbers().encode_point()
643 pubNum = k.pubkey.public_numbers()
646 self.rsamod = pkcs_i2osp(pubNum.n, k.pubkey.key_size//8)
723 pubkey = s.client_kx_privkey.public_key()
724 y = pubkey.public_numbers().y
[all …]
/external/conscrypt/platform/src/main/java/org/conscrypt/
DChainStrengthAnalyzer.java75 Object pubkey = cert.getPublicKey(); in checkKeyLength() local
76 if (pubkey instanceof RSAPublicKey) { in checkKeyLength()
77 int modulusLength = ((RSAPublicKey) pubkey).getModulus().bitLength(); in checkKeyLength()
82 } else if (pubkey instanceof ECPublicKey) { in checkKeyLength()
84 ((ECPublicKey) pubkey).getParams().getCurve().getField().getFieldSize(); in checkKeyLength()
89 } else if (pubkey instanceof DSAPublicKey) { in checkKeyLength()
90 int pLength = ((DSAPublicKey) pubkey).getParams().getP().bitLength(); in checkKeyLength()
91 int qLength = ((DSAPublicKey) pubkey).getParams().getQ().bitLength(); in checkKeyLength()
99 … throw new CertificateException("Rejecting unknown key class " + pubkey.getClass().getName()); in checkKeyLength()
/external/wpa_supplicant_8/src/wps/
Dwps_attr_build.c23 struct wpabuf *pubkey = NULL; in wps_build_public_key() local
39 pubkey = wpabuf_dup(wps->wps->dh_pubkey); in wps_build_public_key()
62 pubkey = wpabuf_dup(wps->wps->ap_nfc_dh_pubkey); in wps_build_public_key()
63 wps->dh_ctx = dh5_init_fixed(wps->dh_privkey, pubkey); in wps_build_public_key()
68 wps->dh_ctx = dh5_init(&wps->dh_privkey, &pubkey); in wps_build_public_key()
69 pubkey = wpabuf_zeropad(pubkey, 192); in wps_build_public_key()
71 if (wps->dh_ctx == NULL || wps->dh_privkey == NULL || pubkey == NULL) { in wps_build_public_key()
74 wpabuf_free(pubkey); in wps_build_public_key()
78 wpa_hexdump_buf(MSG_DEBUG, "WPS: DH own Public Key", pubkey); in wps_build_public_key()
81 wpabuf_put_be16(msg, wpabuf_len(pubkey)); in wps_build_public_key()
[all …]
Dwps_common.c64 struct wpabuf *pubkey, *dh_shared; in wps_derive_keys() local
75 pubkey = wps->registrar ? wps->dh_pubkey_e : wps->dh_pubkey_r; in wps_derive_keys()
76 if (pubkey == NULL) { in wps_derive_keys()
82 wpa_hexdump_buf(MSG_DEBUG, "WPS: DH peer Public Key", pubkey); in wps_derive_keys()
83 dh_shared = dh5_derive_shared(wps->dh_ctx, pubkey, wps->dh_privkey); in wps_derive_keys()
413 const struct wpabuf *pubkey, in wps_build_nfc_pw_token() argument
422 if (wps_build_oob_dev_pw(data, dev_pw_id, pubkey, in wps_build_nfc_pw_token()
624 struct wpabuf * wps_nfc_token_build(int ndef, int id, struct wpabuf *pubkey, in wps_nfc_token_build() argument
629 if (pubkey == NULL || dev_pw == NULL) in wps_nfc_token_build()
632 ret = wps_build_nfc_pw_token(id, pubkey, dev_pw); in wps_nfc_token_build()
[all …]
/external/v8/tools/testrunner/server/
Dstatus_handler.py57 for pubkey in pubkey_list:
58 if server.IsTrusted(pubkey): continue
59 result = _StatusQuery(peer, [constants.GET_SIGNED_PUBKEY, pubkey])
71 def TryTransitiveTrust(peer, pubkey, server): argument
72 if _StatusQuery(peer, [constants.DO_YOU_TRUST, pubkey]):
73 result = _StatusQuery(peer, [constants.GET_SIGNED_PUBKEY, pubkey])
Dmain.py141 if self.IsTrusted(p.pubkey):
147 status_handler.TryTransitiveTrust(p2, p.pubkey, self)
189 if peer.pubkey == fingerprint:
218 pubkey = data[1]
227 if not signatures.VerifySignature(filename, pubkey, signature,
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/netscape/
DNetscapeCertRequest.java53 PublicKey pubkey ; field in NetscapeCertRequest
118 pubkey = KeyFactory.getInstance(keyAlg.getAlgorithm().getId(), "BC") in NetscapeCertRequest()
137 pubkey = pub_key; in NetscapeCertRequest()
186 return pubkey; in getPublicKey()
191 pubkey = value; in setPublicKey()
208 sig.initVerify(pubkey); in verify()
264 baos.write(pubkey.getEncoded()); in getKeySpec()
/external/vboot_reference/utility/
DdumpRSAPublicKey.c140 RSA* pubkey = NULL; in main() local
175 if (!(pubkey = EVP_PKEY_get1_RSA(key))) { in main()
181 if (!(pubkey = PEM_read_RSA_PUBKEY(fp, NULL, NULL, NULL))) { in main()
187 if (check(pubkey)) { in main()
188 output(pubkey); in main()
193 RSA_free(pubkey); in main()
/external/boringssl/src/ssl/
Dssl_cert.cc261 UniquePtr<EVP_PKEY> pubkey = ssl_cert_parse_pubkey(&cert_cbs); in check_leaf_cert_and_privkey() local
262 if (!pubkey) { in check_leaf_cert_and_privkey()
267 if (!ssl_is_key_type_supported(pubkey->type)) { in check_leaf_cert_and_privkey()
274 if (pubkey->type == EVP_PKEY_EC && in check_leaf_cert_and_privkey()
282 !ssl_compare_public_and_private_key(pubkey.get(), privkey)) { in check_leaf_cert_and_privkey()
409 UniquePtr<EVP_PKEY> pubkey; in ssl_parse_cert_chain() local
420 pubkey = ssl_cert_parse_pubkey(&certificate); in ssl_parse_cert_chain()
421 if (!pubkey) { in ssl_parse_cert_chain()
443 *out_pubkey = std::move(pubkey); in ssl_parse_cert_chain()
529 int ssl_compare_public_and_private_key(const EVP_PKEY *pubkey, in ssl_compare_public_and_private_key() argument
[all …]
/external/boringssl/src/crypto/x509/
Dx509_r2x.c71 EVP_PKEY *pubkey = NULL; in X509_REQ_to_X509() local
105 pubkey = X509_REQ_get_pubkey(r); in X509_REQ_to_X509()
106 res = X509_set_pubkey(ret, pubkey); in X509_REQ_to_X509()
107 EVP_PKEY_free(pubkey); in X509_REQ_to_X509()
/external/autotest/client/site_tests/login_OwnershipRetaken/
Dlogin_OwnershipRetaken.py41 pubkey = ownership.known_pubkey()
53 pubkey,
58 if (utils.read_file(constants.OWNER_KEY_FILE) != pubkey):
72 if (utils.read_file(constants.OWNER_KEY_FILE) == pubkey):
/external/boringssl/src/crypto/evp/
Devp_extra_test.cc575 bssl::UniquePtr<EVP_PKEY> pubkey(EVP_PKEY_new_ed25519_public(kPublicKey)); in TEST() local
576 ASSERT_TRUE(pubkey); in TEST()
577 EXPECT_EQ(EVP_PKEY_ED25519, EVP_PKEY_id(pubkey.get())); in TEST()
584 ASSERT_TRUE(EVP_marshal_public_key(cbb.get(), pubkey.get())); in TEST()
591 EXPECT_FALSE(EVP_marshal_private_key(cbb.get(), pubkey.get())); in TEST()
617 EXPECT_EQ(1, EVP_PKEY_cmp(pubkey.get(), privkey.get())); in TEST()
622 EXPECT_EQ(0, EVP_PKEY_cmp(pubkey.get(), pubkey2.get())); in TEST()
Dp_ed25519_asn1.c31 static int set_pubkey(EVP_PKEY *pkey, const uint8_t pubkey[32]) { in set_pubkey()
38 OPENSSL_memcpy(key->key.pub.value, pubkey, 32); in set_pubkey()
114 uint8_t pubkey[32], privkey[64]; in ed25519_priv_decode() local
115 ED25519_keypair_from_seed(pubkey, privkey, CBS_data(&inner)); in ed25519_priv_decode()
Dp_ec.c146 const EC_POINT *pubkey = NULL; in pkey_ec_derive() local
162 pubkey = EC_KEY_get0_public_key(ctx->peerkey->pkey.ec); in pkey_ec_derive()
169 ret = ECDH_compute_key(key, outlen, pubkey, eckey, 0); in pkey_ec_derive()
/external/v8/tools/testrunner/objects/
Dworkpacket.py34 base_revision=None, patch=None, pubkey=None): argument
41 self.pubkey_fingerprint = pubkey
90 pubkey=pubkey_fingerprint)
Dpeer.py30 def __init__(self, address, jobs, rel_perf, pubkey): argument
34 self.pubkey = pubkey # string: pubkey's fingerprint
/external/curl/lib/vtls/
Dcyassl.c542 curl_asn1Element *pubkey; in cyassl_connect_step2() local
561 pubkey = &x509_parsed.subjectPublicKeyInfo; in cyassl_connect_step2()
562 if(!pubkey->header || pubkey->end <= pubkey->header) { in cyassl_connect_step2()
569 (const unsigned char *)pubkey->header, in cyassl_connect_step2()
570 (size_t)(pubkey->end - pubkey->header)); in cyassl_connect_step2()
/external/autotest/client/common_lib/cros/
Dpolicy.py115 def generate_policy(proto_binding_location, key, pubkey, policy, old_key=None): argument
144 policy_proto.new_public_key = pubkey
145 policy_proto.new_public_key_signature = ownership.sign(old_key, pubkey)
/external/wpa_supplicant_8/src/crypto/
Dcrypto_openssl.c646 struct wpabuf *pubkey = NULL, *privkey = NULL; in dh5_init() local
669 pubkey = wpabuf_alloc(publen); in dh5_init()
670 if (pubkey == NULL) in dh5_init()
677 BN_bn2bin(dh->pub_key, wpabuf_put(pubkey, publen)); in dh5_init()
681 *publ = pubkey; in dh5_init()
685 wpabuf_clear_free(pubkey); in dh5_init()
691 struct wpabuf *pubkey = NULL, *privkey = NULL; in dh5_init()
717 pubkey = wpabuf_alloc(publen); in dh5_init()
718 if (!pubkey) in dh5_init()
725 BN_bn2bin(pub_key, wpabuf_put(pubkey, publen)); in dh5_init()
[all …]

123456