/external/openscreen/cast/receiver/channel/ |
D | static_credentials.cc | 33 EVP_PKEY* root_key, in GenerateCredentials() argument 35 OSP_CHECK(root_key); in GenerateCredentials() 45 GetWallTimeSinceUnixEpoch(), true, root_cert, root_key); in GenerateCredentials() 123 bssl::UniquePtr<EVP_PKEY> root_key = GenerateRsaKeyPair(); in GeneratePrivateKey() local 124 OSP_CHECK(root_key); in GeneratePrivateKey() 125 return root_key; in GeneratePrivateKey() 128 bssl::UniquePtr<X509> GenerateRootCert(const EVP_PKEY& root_key) { in GenerateRootCert() argument 131 root_key, GetWallTimeSinceUnixEpoch(), in GenerateRootCert() 152 bssl::UniquePtr<EVP_PKEY> root_key = GeneratePrivateKey(); in GenerateDeveloperCredentialsToFile() local 153 bssl::UniquePtr<X509> root_cert = GenerateRootCert(*root_key); in GenerateDeveloperCredentialsToFile() [all …]
|
/external/vboot_reference/tests/futility/ |
D | test_sign_firmware.sh | 89 m=$(${FUTILITY} verify --publickey ${KEYDIR}/root_key.vbpubk ${outfile} \ 94 ${FUTILITY} verify --publickey ${KEYDIR}/root_key.vbpubk ${outfile} \ 106 ${FUTILITY} verify --publickey ${KEYDIR}/root_key.vbpubk \ 110 ${FUTILITY} verify --publickey ${KEYDIR}/root_key.vbpubk \ 125 ${FUTILITY} verify --publickey ${KEYDIR}/root_key.vbpubk ${GOOD_OUT} \ 133 ${FUTILITY} verify --publickey ${KEYDIR}/root_key.vbpubk ${MORE_OUT} \ 155 m=$(${FUTILITY} verify --publickey ${KEYDIR}/root_key.vbpubk ${MORE_OUT}.2 \ 173 m=$(${FUTILITY} verify --publickey ${KEYDIR}/root_key.vbpubk ${MORE_OUT}.3 \
|
D | test_sign_keyblocks.sh | 22 --signprivate ${DEVKEYS}/root_key.vbprivk 26 --signpubkey ${DEVKEYS}/root_key.vbpubk 36 --signprivate ${DEVKEYS}/root_key.vbprivk \
|
D | test_sign_fw_main.sh | 28 --signpubkey ${KEYDIR}/root_key.vbpubk \
|
D | test_show_vs_verify.sh | 25 --publickey ${DEVKEYS}/root_key.vbpubk
|
/external/python/cpython2/Lib/test/ |
D | test_winreg.py | 81 def _write_test_data(self, root_key, CreateKey=CreateKey): argument 83 SetValue(root_key, test_key_name, REG_SZ, "Default value") 84 key = CreateKey(root_key, test_key_name) 121 def _read_test_data(self, root_key, OpenKey=OpenKey): argument 123 val = QueryValue(root_key, test_key_name) 127 key = OpenKey(root_key, test_key_name) 161 def _delete_test_data(self, root_key): argument 162 key = OpenKey(root_key, test_key_name, 0, KEY_ALL_ACCESS) 183 DeleteKey(root_key, test_key_name) 186 key = OpenKey(root_key, test_key_name) [all …]
|
/external/linux-kselftest/tools/testing/selftests/tpm2/ |
D | tpm2_tests.py | 16 self.root_key = self.client.create_root_key() 19 self.client.flush_context(self.root_key) 26 blob = self.client.seal(self.root_key, data, auth, None) 27 result = self.client.unseal(self.root_key, blob, auth, None) 45 blob = self.client.seal(self.root_key, data, auth, policy_dig) 53 result = self.client.unseal(self.root_key, blob, auth, handle) 65 blob = self.client.seal(self.root_key, data, auth, None) 67 result = self.client.unseal(self.root_key, blob, auth[:-1] + 'B', None) 88 blob = self.client.seal(self.root_key, data, auth, policy_dig) 102 result = self.client.unseal(self.root_key, blob, auth, handle) [all …]
|
/external/python/cpython3/Lib/test/ |
D | test_winreg.py | 75 def _write_test_data(self, root_key, subkeystr="sub_key", argument 78 SetValue(root_key, test_key_name, REG_SZ, "Default value") 79 key = CreateKey(root_key, test_key_name) 117 def _read_test_data(self, root_key, subkeystr="sub_key", OpenKey=OpenKey): argument 119 val = QueryValue(root_key, test_key_name) 123 key = OpenKey(root_key, test_key_name) 157 def _delete_test_data(self, root_key, subkeystr="sub_key"): argument 158 key = OpenKey(root_key, test_key_name, 0, KEY_ALL_ACCESS) 179 DeleteKey(root_key, test_key_name) 182 key = OpenKey(root_key, test_key_name) [all …]
|
/external/rust/crates/grpcio-sys/grpc/src/core/lib/security/credentials/alts/ |
D | check_gcp_environment_windows.cc | 39 bool check_windows_registry_product_name(HKEY root_key, in check_windows_registry_product_name() argument 49 root_key, reg_key_path, reg_key_name, RRF_RT_REG_SZ, in check_windows_registry_product_name() 65 root_key, reg_key_path, reg_key_name, RRF_RT_REG_SZ, in check_windows_registry_product_name()
|
/external/vboot_reference/ |
D | README | 101 $ openssl genrsa -F4 -out root_key.pem 8192 116 $ openssl req -batch -new -x509 -key root_key.pem -out root_key.crt 118 $ dumpRSAPublicKey root_key.crt > root_key.keyb 134 --root_key root_key.pem \ 156 --root_key_pub root_key.keyb 162 root_key.keyb can be stored in RW part of the firmware. For the
|
/external/vboot_reference/scripts/keygeneration/ |
D | create_new_keys.sh | 97 make_pair root_key ${root_key_algoid} 112 make_keyblock firmware ${FIRMWARE_KEYBLOCK_MODE} firmware_data_key root_key 118 make_keyblock dev_firmware ${DEV_FIRMWARE_KEYBLOCK_MODE} dev_firmware_data_key root_key
|
D | increment_firmware_data_key.sh | 39 make_keyblock firmware ${FIRMWARE_KEYBLOCK_MODE} firmware_data_key root_key
|
/external/vboot_reference/firmware/lib/ |
D | vboot_firmware.c | 47 VbPublicKey *root_key = NULL; in LoadFirmware() local 66 retval = VbGbbReadRootKey(cparams, &root_key); in LoadFirmware() 137 root_key, 0))) { in LoadFirmware() 349 VbExFree(root_key); in LoadFirmware()
|
/external/vboot_reference/firmware/lib20/ |
D | misc.c | 25 struct vb2_public_key root_key; in vb2_load_fw_keyblock() local 46 rv = vb2_unpack_key(&root_key, key_data, key_size); in vb2_load_fw_keyblock() 76 rv = vb2_verify_keyblock(kb, block_size, &root_key, &wb); in vb2_load_fw_keyblock()
|
/external/vboot_reference/firmware/lib21/ |
D | misc.c | 73 struct vb2_public_key root_key; in vb2_load_fw_keyblock() local 92 rv = vb2_unpack_key(&root_key, key_data, key_size); in vb2_load_fw_keyblock() 106 rv = vb2_verify_keyblock(kb, kb->c.total_size, &root_key, &wb); in vb2_load_fw_keyblock()
|
/external/vboot_reference/tests/ |
D | vboot_firmware_tests.c | 42 VbPublicKey *root_key; in ResetMocks() local 86 root_key = (VbPublicKey *)(gbb_data + gbb->rootkey_offset); in ResetMocks() 87 root_key_data = (uint8_t *)(root_key + 1); in ResetMocks() 89 PublicKeyInit(root_key, (uint8_t *)root_key_data, sizeof(TEST_KEY_DATA)); in ResetMocks()
|
D | gen_fuzz_test_cases.sh | 51 cp ${TESTKEY_DIR}/key_rsa8192.sha512.vbpubk ${TESTCASE_DIR}/root_key.vbpubk
|
/external/rust/crates/grpcio-sys/grpc/test/core/security/ |
D | check_gcp_environment_windows_test.cc | 35 bool check_windows_registry_product_name(HKEY root_key,
|
/external/python/pyopenssl/tests/ |
D | test_crypto.py | 3499 root_key = load_privatekey(FILETYPE_PEM, root_key_pem) variable in TestCRL 3800 self.root_cert, self.root_key, certs=[self.intermediate_cert] 3824 self.root_cert, self.root_key, certs=[self.intermediate_cert]
|