/external/avb/libavb/ |
D | avb_chain_partition_descriptor.c | 45 dest->public_key_len = avb_be32toh(dest->public_key_len); in avb_chain_partition_descriptor_validate_and_byteswap() 55 !avb_safe_add_to(&expected_size, dest->public_key_len)) { in avb_chain_partition_descriptor_validate_and_byteswap()
|
D | avb_chain_partition_descriptor.h | 55 uint32_t public_key_len; member
|
D | avb_slot_verify.c | 1029 chain_desc.public_key_len, in load_and_verify_vbmeta()
|
/external/openssh/regress/misc/sk-dummy/ |
D | sk-dummy.c | 93 response->public_key_len = 0; in pack_key_ecdsa() 112 response->public_key_len = EC_POINT_point2oct(g, q, in pack_key_ecdsa() 114 if (response->public_key_len == 0 || response->public_key_len > 2048) { in pack_key_ecdsa() 116 response->public_key_len); in pack_key_ecdsa() 119 if ((response->public_key = malloc(response->public_key_len)) == NULL) { in pack_key_ecdsa() 124 response->public_key, response->public_key_len, NULL) == 0) { in pack_key_ecdsa() 149 response->public_key_len); in pack_key_ecdsa() 176 response->public_key_len = 0; in pack_key_ed25519() 184 response->public_key_len = sizeof(pk); in pack_key_ed25519() 185 if ((response->public_key = malloc(response->public_key_len)) == NULL) { in pack_key_ed25519()
|
/external/openssh/ |
D | sk-usbhid.c | 288 response->public_key_len = 0; in pack_public_key_ecdsa() 316 response->public_key_len = EC_POINT_point2oct(g, q, in pack_public_key_ecdsa() 318 if (response->public_key_len == 0 || response->public_key_len > 2048) { in pack_public_key_ecdsa() 320 response->public_key_len); in pack_public_key_ecdsa() 323 if ((response->public_key = malloc(response->public_key_len)) == NULL) { in pack_public_key_ecdsa() 328 response->public_key, response->public_key_len, NULL) == 0) { in pack_public_key_ecdsa() 336 memset(response->public_key, 0, response->public_key_len); in pack_public_key_ecdsa() 357 response->public_key_len = 0; in pack_public_key_ed25519() 367 response->public_key_len = len; in pack_public_key_ed25519() 368 if ((response->public_key = malloc(response->public_key_len)) == NULL) { in pack_public_key_ed25519() [all …]
|
D | ssh-sk.c | 174 freezero(r->public_key, r->public_key_len); in sshsk_free_enroll_response() 215 resp->public_key, resp->public_key_len)) != 0) { in sshsk_ecdsa_assemble() 254 if (resp->public_key_len != ED25519_PK_SZ) { in sshsk_ed25519_assemble() 255 error("%s: invalid size: %zu", __func__, resp->public_key_len); in sshsk_ed25519_assemble() 718 freezero(rks[i]->key.public_key, rks[i]->key.public_key_len); in sshsk_free_sk_resident_keys()
|
D | sk-api.h | 43 size_t public_key_len; member
|
D | PROTOCOL.u2f | 259 size_t public_key_len;
|
/external/rust/crates/ring/src/ |
D | ec.rs | 20 pub public_key_len: usize, field
|
/external/rust/crates/ring/src/ec/suite_b/ |
D | curve.rs | 36 public_key_len: 1 + (2 * (($bits + 7) / 8)),
|
/external/rust/crates/ring/src/ec/ |
D | keys.rs | 70 len: self.curve.public_key_len, in compute_public_key()
|
/external/wpa_supplicant_8/src/wps/ |
D | wps_attr_parse.h | 78 u16 public_key_len; member
|
D | wps_attr_parse.c | 511 attr->public_key_len = len; in wps_set_attr()
|
D | wps_validate.c | 1306 wps_validate_public_key(attr.public_key, attr.public_key_len, 1) || in wps_validate_m1() 1362 wps_validate_public_key(attr.public_key, attr.public_key_len, 1) || in wps_validate_m2()
|
D | wps_enrollee.c | 998 if (wps_process_pubkey(wps, attr->public_key, attr->public_key_len) || in wps_process_m2()
|
D | wps_registrar.c | 2669 wps_process_pubkey(wps, attr->public_key, attr->public_key_len) || in wps_process_m1() 2720 len = attr->public_key_len; in wps_process_m1()
|
/external/avb/test/ |
D | avb_util_unittest.cc | 298 h.public_key_len = htobe32(17); in TEST_F() 306 EXPECT_EQ(17UL, s.public_key_len); in TEST_F() 325 bad.public_key_len = htobe32(25); in TEST_F()
|
D | avbtool_unittest.cc | 2373 d.public_key_len)); in TEST_F()
|
/external/wpa_supplicant_8/src/tls/ |
D | x509v3.h | 64 size_t public_key_len; member
|
D | tlsv1_client_ocsp.c | 56 size_t len[1] = { signer->public_key_len }; in ocsp_responder_id_match() 206 issuer->public_key_len, hash); in tls_process_ocsp_single_response()
|
D | tlsv1_common.c | 193 *pk = crypto_public_key_import(cert->public_key, cert->public_key_len); in tls_parse_cert()
|
D | x509v3.c | 284 cert->public_key_len = hdr.length - 1; in x509_parse_public_key() 286 cert->public_key, cert->public_key_len); in x509_parse_public_key() 1922 issuer->public_key_len); in x509_check_signature()
|
/external/rust/crates/ring/src/ec/curve25519/ |
D | x25519.rs | 22 public_key_len: PUBLIC_KEY_LEN,
|
/external/avb/ |
D | avbtool.py | 1825 public_key_len, _) = struct.unpack(self.FORMAT_STRING, data[0:self.SIZE]) 1827 self.SIZE - 16 + partition_name_len + public_key_len, 8) 1840 self.public_key = data[(self.SIZE + o):(self.SIZE + o + public_key_len)]
|
D | avbtool | 1825 public_key_len, _) = struct.unpack(self.FORMAT_STRING, data[0:self.SIZE]) 1827 self.SIZE - 16 + partition_name_len + public_key_len, 8) 1840 self.public_key = data[(self.SIZE + o):(self.SIZE + o + public_key_len)]
|