HomeSort by: relevance | last modified time | path
    Searched defs:pubKey (Results 1 - 12 of 12) sorted by relevancy

  /src/crypto/external/cpl/trousers/dist/src/tspi/
tsp_asym.c 38 TPM_PUBKEY pubKey;
50 if ((result = Trspi_UnloadBlob_PUBKEY(&offset, blob, &pubKey))) {
56 if (pubKey.pubKey.keyLength < inDataLen) {
61 if (pubKey.algorithmParms.encScheme == TPM_ES_RSAESPKCSv15 ||
62 pubKey.algorithmParms.encScheme == TSS_ES_RSAESPKCSV15) {
64 pubKey.pubKey.key, pubKey.pubKey.keyLength))
    [all...]
tspi_sign.c 110 BYTE *pubKey = NULL;
123 if ((result = obj_rsakey_get_modulus(hKey, &pubKeySize, &pubKey)))
127 free_tspi(tspContext, pubKey);
132 free_tspi(tspContext, pubKey);
137 result = Trspi_Verify(TSS_HASH_SHA1, hashData, hashDataSize, pubKey, pubKeySize,
140 result = Trspi_Verify(TSS_HASH_OTHER, hashData, hashDataSize, pubKey, pubKeySize,
146 free_tspi(tspContext, pubKey);
tspi_ek.c 149 TCPA_PUBKEY pubKey;
152 __tspi_memset(&pubKey, 0, sizeof(TCPA_PUBKEY));
190 /* check validation of the entire pubkey structure */
193 * just the pubKey portion of the pubEK. This is done on
197 __tspi_memset(&pubKey, 0, sizeof(TCPA_PUBKEY));
198 if ((result = Trspi_UnloadBlob_PUBKEY(&offset, pubEK, &pubKey)))
202 result |= Trspi_HashUpdate(&hashCtx, pubKey.pubKey.keyLength,
203 pubKey.pubKey.key)
    [all...]
tspi_cmk.c 130 BYTE *pubKey = NULL;
148 if ((result = obj_rsakey_get_pub_blob(hVerifyKey, &pubKeySize, &pubKey)))
161 result |= Trspi_HashUpdate(&hashCtx, pubKeySize, pubKey);
172 if ((result = RPC_CMK_CreateTicket(hContext, pubKeySize, pubKey, sigData, sigSize, sig,
190 free_tspi(hContext, pubKey);
252 free(tpmMigKeyAuth.migrationKey.pubKey.key);
tspi_key.c 485 pubLen = keyContainer.pubKey.keyLength;
641 BYTE *pubKey = NULL;
671 /* Get associated pubKey */
672 if ((result = obj_rsakey_get_pub_blob(hTssKey, &pubKeyLen, &pubKey)))
678 LogDebugData(pubKeyLen, pubKey);
679 result |= Trspi_HashUpdate(&hashCtx, pubKeyLen, pubKey);
683 free_tspi(tspContext, pubKey);
689 free_tspi(tspContext, pubKey);
693 if ((result = RPC_KeyControlOwner(tspContext, hTcsKey, pubKeyLen, pubKey, tpmAttribName,
695 free_tspi(tspContext, pubKey);
    [all...]
  /src/crypto/external/cpl/trousers/dist/src/tcs/rpc/tcstp/
rpc_maint.c 212 BYTE *pubKey;
230 pubKey = (BYTE *)malloc(pubKeySize);
231 if (pubKey == NULL) {
236 if (getData(TCSD_PACKET_TYPE_PBYTE, 3, pubKey, pubKeySize, &data->comm)) {
237 free(pubKey);
243 result = TCSP_LoadManuMaintPub_Internal(hContext, antiReplay, pubKeySize, pubKey,
247 free(pubKey);
rpc_key.c 68 BYTE *pubKey;
93 result = TCSP_GetPubKey_Internal(hContext, hKey, pAuth, &pubKeySize, &pubKey);
102 free(pubKey);
106 free(pubKey);
109 if (setData(TCSD_PACKET_TYPE_PBYTE, i++, pubKey, pubKeySize, &data->comm)) {
110 free(pubKey);
113 free(pubKey);
  /src/crypto/external/cpl/trousers/dist/src/tcs/
tcsi_ps.c 610 TCPA_STORE_PUBKEY pubKey;
613 pubKey.key = NULL;
620 pubKey.keyLength = ulPublicInfoLength;
621 pubKey.key = malloc(pubKey.keyLength);
622 if (pubKey.key == NULL) {
623 LogError("malloc of %d bytes failed.", pubKey.keyLength);
627 memcpy(pubKey.key, rgbPublicInfo, pubKey.keyLength);
629 if ((result = ps_get_key_by_pub(&pubKey, keySize, keyBlob)))
    [all...]
  /src/crypto/external/cpl/trousers/dist/src/include/
trousers_types.h 116 TPM_STORE_PUBKEY pubKey;
  /src/external/apache2/mDNSResponder/dist/Clients/dnssdutil/
DNSServerDNSSEC.c 31 check_compile_time( offsetof( DNSKey ## ALG_NAME ## Info, pubKey ) == sizeof( dns_fixed_fields_dnskey ) ); \
45 uint8_t pubKey[ kRSASHA1_PublicKeyBytes ]; // Public key.
63 uint8_t pubKey[ kRSASHA256_PublicKeyBytes ]; // Public key.
81 uint8_t pubKey[ kRSASHA512_PublicKeyBytes ]; // Public key.
99 uint8_t pubKey[ kECDSAP256SHA256_PublicKeyBytes ]; // Public key.
117 uint8_t pubKey[ kECDSAP384SHA384_PublicKeyBytes ]; // Public key.
131 uint8_t pubKey[ kEd25519_PublicKeyBytes ]; // Public key.
194 .pubKey =
296 .pubKey =
401 .pubKey
    [all...]
  /src/crypto/external/bsd/openssh/dist/
ssh-pkcs11.c 1160 * Expect either a raw 32 byte pubkey or an OCTET STRING with
1161 * a 32 byte pubkey in CKA_VALUE
1646 CK_OBJECT_HANDLE pubKey, privKey;
1687 &pubKey, &privKey)) != CKR_OK) {
1693 return pkcs11_fetch_rsa_pubkey(p, slotidx, &pubKey);
1767 CK_OBJECT_HANDLE pubKey, privKey;
1817 &pubKey, &privKey)) != CKR_OK) {
1823 return pkcs11_fetch_ecdsa_pubkey(p, slotidx, &pubKey);
  /src/crypto/external/cpl/trousers/dist/src/include/tss/
tpm.h 835 TPM_STORE_PUBKEY pubKey;
864 TPM_STORE_PUBKEY pubKey;
881 TPM_STORE_PUBKEY pubKey;

Completed in 36 milliseconds