/external/libchrome/crypto/ |
D | nss_key_util_unittest.cc | 37 ScopedSECKEYPublicKey public_key; in TEST_F() local 40 false /* not permanent */, &public_key, in TEST_F() 43 EXPECT_EQ(rsaKey, SECKEY_GetPublicKeyType(public_key.get())); in TEST_F() 51 ScopedSECKEYPublicKey public_key; in TEST_F() local 54 false /* not permanent */, &public_key, in TEST_F() 57 ScopedSECItem item(SECKEY_EncodeDERSubjectPublicKeyInfo(public_key.get())); in TEST_F() 69 ScopedSECKEYPublicKey public_key; in TEST_F() local 72 false /* not permanent */, &public_key, in TEST_F() 75 ScopedSECItem item(SECKEY_EncodeDERSubjectPublicKeyInfo(public_key.get())); in TEST_F() 81 PK11_DestroyTokenObject(public_key->pkcs11Slot, public_key->pkcs11ID); in TEST_F()
|
D | signature_verifier_nss.cc | 45 SECStatus VerifyRSAPSS_End(SECKEYPublicKey* public_key, in VerifyRSAPSS_End() argument 55 unsigned int modulus_len = SECKEY_PublicKeyStrength(public_key); in VerifyRSAPSS_End() 61 SECStatus rv = PK11_PubEncryptRaw(public_key, &enc[0], in VerifyRSAPSS_End() 99 SECKEYPublicKey* public_key = DecodePublicKeyInfo(public_key_info, in VerifyInit() local 101 if (!public_key) in VerifyInit() 109 public_key, &sig, ToNSSSignatureType(signature_algorithm), nullptr); in VerifyInit() 110 SECKEY_DestroyPublicKey(public_key); // Done with public_key. in VerifyInit() 137 SECKEYPublicKey* public_key = DecodePublicKeyInfo(public_key_info, in VerifyInitRSAPSS() local 139 if (!public_key) in VerifyInitRSAPSS() 142 public_key_ = public_key; in VerifyInitRSAPSS() [all …]
|
D | rsa_private_key_nss.cc | 61 ScopedSECKEYPublicKey public_key; in Create() local 64 &public_key, &private_key)) { in Create() 69 rsa_key->public_key_ = public_key.release(); in Create()
|
D | ec_private_key.h | 78 SECKEYPublicKey** public_key); 88 SECKEYPublicKey* public_key() { return public_key_; } in public_key() function
|
D | nss_key_util.cc | 62 ScopedSECKEYPublicKey* public_key, in GenerateRSAKeyPairNSS() argument 76 public_key->reset(public_key_raw); in GenerateRSAKeyPairNSS()
|
/external/vboot_reference/tests/ |
D | vboot_common2_tests.c | 43 static void VerifyDataTest(const VbPublicKey *public_key, in VerifyDataTest() argument 54 rsa = PublicKeyToRSA(public_key); in VerifyDataTest() 79 static void VerifyDigestTest(const VbPublicKey *public_key, in VerifyDigestTest() argument 88 rsa = PublicKeyToRSA(public_key); in VerifyDigestTest() 90 (int)public_key->algorithm); in VerifyDigestTest() 118 static void VerifyKernelPreambleTest(const VbPublicKey *public_key, in VerifyKernelPreambleTest() argument 129 rsa = PublicKeyToRSA(public_key); in VerifyKernelPreambleTest() 218 VbPublicKey *public_key = NULL; in test_algorithm() local 230 public_key = PublicKeyReadKeyb(filename, key_algorithm, 1); in test_algorithm() 231 if (!public_key) { in test_algorithm() [all …]
|
D | vboot_common3_tests.c | 30 static void KeyBlockVerifyTest(const VbPublicKey *public_key, in KeyBlockVerifyTest() argument 47 TEST_EQ(KeyBlockVerify(hdr, hsize, public_key, 0), 0, in KeyBlockVerifyTest() 109 TEST_NEQ(KeyBlockVerify(h, hsize, public_key, 0), 0, in KeyBlockVerifyTest() 115 TEST_NEQ(KeyBlockVerify(h, hsize, public_key, 0), 0, in KeyBlockVerifyTest() 120 TEST_NEQ(KeyBlockVerify(h, hsize, public_key, 0), 0, in KeyBlockVerifyTest() 125 TEST_NEQ(KeyBlockVerify(h, hsize, public_key, 1), 0, in KeyBlockVerifyTest() 166 static void VerifyFirmwarePreambleTest(const VbPublicKey *public_key, in VerifyFirmwarePreambleTest() argument 178 rsa = PublicKeyToRSA(public_key); in VerifyFirmwarePreambleTest()
|
D | vb20_common3_tests.c | 32 static void test_verify_keyblock(const VbPublicKey *public_key, in test_verify_keyblock() argument 47 TEST_SUCC(vb2_unpack_key(&key, (uint8_t *)public_key, in test_verify_keyblock() 48 public_key->key_offset + public_key->key_size), in test_verify_keyblock() 172 static void test_verify_fw_preamble(const VbPublicKey *public_key, in test_verify_fw_preamble() argument 189 TEST_SUCC(vb2_unpack_key(&rsa, (uint8_t *)public_key, in test_verify_fw_preamble() 190 public_key->key_offset + public_key->key_size), in test_verify_fw_preamble()
|
/external/libbrillo/policy/ |
D | device_policy_impl.cc | 28 std::string* public_key) { in ReadPublicKeyFromFile() argument 31 public_key->clear(); in ReadPublicKeyFromFile() 32 if (!base::ReadFileToString(key_file, public_key) || public_key->empty()) { in ReadPublicKeyFromFile() 42 const std::string& public_key) { in VerifySignature() argument 48 char* key = const_cast<char*>(public_key.data()); in VerifySignature() 49 BIO* bio = BIO_new_mem_buf(key, public_key.length()); in VerifySignature() 450 std::string public_key; in VerifyPolicySignature() local 451 if (!ReadPublicKeyFromFile(base::FilePath(keyfile_path_), &public_key)) { in VerifyPolicySignature() 455 if (!VerifySignature(policy_data, policy_data_signature, public_key)) { in VerifyPolicySignature()
|
/external/boringssl/src/tool/ |
D | generate_ed25519.cc | 68 uint8_t public_key[32], private_key[64]; in GenerateEd25519Key() local 69 ED25519_keypair(public_key, private_key); in GenerateEd25519Key() 71 return WriteToFile(args_map["-out-public"], public_key, sizeof(public_key)) && in GenerateEd25519Key()
|
/external/boringssl/src/crypto/x509/ |
D | x_pubkey.c | 85 ASN1_SIMPLE(X509_PUBKEY, public_key, ASN1_BIT_STRING) 344 if (pub->public_key->data) in X509_PUBKEY_set0_param() 345 OPENSSL_free(pub->public_key->data); in X509_PUBKEY_set0_param() 346 pub->public_key->data = penc; in X509_PUBKEY_set0_param() 347 pub->public_key->length = penclen; in X509_PUBKEY_set0_param() 349 pub->public_key->flags &= ~(ASN1_STRING_FLAG_BITS_LEFT | 0x07); in X509_PUBKEY_set0_param() 350 pub->public_key->flags |= ASN1_STRING_FLAG_BITS_LEFT; in X509_PUBKEY_set0_param() 362 *pk = pub->public_key->data; in X509_PUBKEY_get0_param() 363 *ppklen = pub->public_key->length; in X509_PUBKEY_get0_param()
|
/external/boringssl/src/crypto/curve25519/ |
D | ed25519_test.cc | 29 std::vector<uint8_t> private_key, public_key, message, expected_signature; in TEST() local 32 ASSERT_TRUE(t->GetBytes(&public_key, "PUB")); in TEST() 33 ASSERT_EQ(32u, public_key.size()); in TEST() 43 public_key.data())); in TEST()
|
/external/autotest/server/site_tests/autoupdate_CatchBadSignatures/ |
D | autoupdate_CatchBadSignatures.py | 124 def _check_signature(self, metadata_signature, public_key, argument 138 public_key=public_key) 157 public_key=self._IMAGE_PUBLIC_KEY2, 174 public_key=self._IMAGE_PUBLIC_KEY2,
|
/external/boringssl/src/ssl/ |
D | ssl_ecdh.cc | 57 bssl::UniquePtr<EC_POINT> public_key(EC_POINT_new(group.get())); in ssl_ec_point_offer() local 58 if (!public_key || in ssl_ec_point_offer() 59 !EC_POINT_mul(group.get(), public_key.get(), private_key.get(), NULL, in ssl_ec_point_offer() 61 !EC_POINT_point2cbb(out, group.get(), public_key.get(), in ssl_ec_point_offer() 154 uint8_t public_key[32]; in ssl_x25519_offer() local 155 X25519_keypair(public_key, (uint8_t *)ctx->data); in ssl_x25519_offer() 156 return CBB_add_bytes(out, public_key, sizeof(public_key)); in ssl_x25519_offer()
|
/external/boringssl/src/crypto/ec_extra/ |
D | ec_asn1.c | 142 CBS child, public_key; in EC_KEY_parse_private_key() local 145 !CBS_get_asn1(&child, &public_key, CBS_ASN1_BITSTRING) || in EC_KEY_parse_private_key() 148 !CBS_get_u8(&public_key, &padding) || in EC_KEY_parse_private_key() 152 CBS_len(&public_key) == 0 || in EC_KEY_parse_private_key() 153 !EC_POINT_oct2point(group, ret->pub_key, CBS_data(&public_key), in EC_KEY_parse_private_key() 154 CBS_len(&public_key), NULL) || in EC_KEY_parse_private_key() 163 (point_conversion_form_t)(CBS_data(&public_key)[0] & ~0x01); in EC_KEY_parse_private_key() 223 CBB child, public_key; in EC_KEY_marshal_private_key() local 225 !CBB_add_asn1(&child, &public_key, CBS_ASN1_BITSTRING) || in EC_KEY_marshal_private_key() 228 !CBB_add_u8(&public_key, 0 /* padding */) || in EC_KEY_marshal_private_key() [all …]
|
/external/autotest/client/site_tests/autoupdate_CannedOmahaUpdate/ |
D | autoupdate_CannedOmahaUpdate.py | 99 public_key=None): argument 108 self._public_key = public_key 126 public_key=None): argument 135 public_key)
|
/external/testng/ |
D | README.dev | 8 gpg --keyserver hkp://pool.sks-keyservers.net --send-keys <public_key> 33 mvn -Dgpg.passphrase= -Dgpg.keyname=<public_key> deploy 36 mvn -Dgpg.passphrase= -Dgpg.keyname=<public_key> release:clean release:prepare release:perform
|
/external/openssh/ |
D | kexecdhs.c | 68 const EC_POINT *public_key; in input_kex_ecdh_init() local 178 public_key = EC_KEY_get0_public_key(server_key); in input_kex_ecdh_init() 182 (r = sshpkt_put_ec(ssh, public_key, group)) != 0 || in input_kex_ecdh_init()
|
D | kexecdhc.c | 60 const EC_POINT *public_key; in kexecdh_client() local 72 public_key = EC_KEY_get0_public_key(client_key); in kexecdh_client() 75 (r = sshpkt_put_ec(ssh, public_key, group)) != 0 || in kexecdh_client()
|
/external/boringssl/src/crypto/x509v3/ |
D | v3_skey.c | 129 pk = ctx->subject_req->req_info->pubkey->public_key; in s2i_skey_id() 131 pk = ctx->subject_cert->cert_info->key->public_key; in s2i_skey_id()
|
/external/boringssl/src/crypto/evp/ |
D | print.c | 301 const EC_POINT *public_key; in do_EC_KEY_print() local 318 public_key = EC_KEY_get0_public_key(x); in do_EC_KEY_print() 319 if (public_key != NULL) { in do_EC_KEY_print() 321 group, public_key, EC_KEY_get_conv_form(x), NULL, 0, ctx); in do_EC_KEY_print() 332 EC_POINT_point2oct(group, public_key, EC_KEY_get_conv_form(x), in do_EC_KEY_print()
|
/external/autotest/client/site_tests/network_DestinationVerification/ |
D | network_DestinationVerification.py | 255 def _test_encrypt(self, public_key, data_to_encrypt, expect_failure=False): argument 267 message.public_key = public_key
|
/external/autotest/client/site_tests/login_MultiUserPolicy/ |
D | login_MultiUserPolicy.py | 55 public_key = ownership.known_pubkey() 60 public_key,
|
/external/autotest/server/ |
D | base_utils.py | 303 public_key = open(public_key_path, 'r') 304 public_key_str = public_key.read() 305 public_key.close()
|
/external/avb/test/ |
D | avb_atx_validate_unittest.cc | 186 metadata_.product_signing_key_certificate.signed_data.public_key, in Validate() 304 metadata_.product_signing_key_certificate.signed_data.public_key, in Validate() 350 metadata_.product_intermediate_key_certificate.signed_data.public_key[0] ^= 1; in TEST_F() 427 metadata_.product_signing_key_certificate.signed_data.public_key[0] ^= 1; in TEST_F() 496 metadata_.product_signing_key_certificate.signed_data.public_key, in Validate()
|