OpenGrok
Home
Sort by:
relevance
|
last modified time
|
path
Full Search
in project(s):
src
xsrc
Definition
Symbol
File Path
History
|
|
Help
Searched
defs:pubKey
(Results
1 - 12
of
12
) sorted by relevancy
/src/crypto/external/cpl/trousers/dist/src/tspi/
tsp_asym.c
38
TPM_PUBKEY
pubKey
;
50
if ((result = Trspi_UnloadBlob_PUBKEY(&offset, blob, &
pubKey
))) {
56
if (
pubKey
.
pubKey
.keyLength < inDataLen) {
61
if (
pubKey
.algorithmParms.encScheme == TPM_ES_RSAESPKCSv15 ||
62
pubKey
.algorithmParms.encScheme == TSS_ES_RSAESPKCSV15) {
64
pubKey
.
pubKey
.key,
pubKey
.
pubKey
.keyLength))
[
all
...]
tspi_sign.c
110
BYTE *
pubKey
= NULL;
123
if ((result = obj_rsakey_get_modulus(hKey, &pubKeySize, &
pubKey
)))
127
free_tspi(tspContext,
pubKey
);
132
free_tspi(tspContext,
pubKey
);
137
result = Trspi_Verify(TSS_HASH_SHA1, hashData, hashDataSize,
pubKey
, pubKeySize,
140
result = Trspi_Verify(TSS_HASH_OTHER, hashData, hashDataSize,
pubKey
, pubKeySize,
146
free_tspi(tspContext,
pubKey
);
tspi_ek.c
149
TCPA_PUBKEY
pubKey
;
152
__tspi_memset(&
pubKey
, 0, sizeof(TCPA_PUBKEY));
190
/* check validation of the entire
pubkey
structure */
193
* just the
pubKey
portion of the pubEK. This is done on
197
__tspi_memset(&
pubKey
, 0, sizeof(TCPA_PUBKEY));
198
if ((result = Trspi_UnloadBlob_PUBKEY(&offset, pubEK, &
pubKey
)))
202
result |= Trspi_HashUpdate(&hashCtx,
pubKey
.
pubKey
.keyLength,
203
pubKey
.
pubKey
.key)
[
all
...]
tspi_cmk.c
130
BYTE *
pubKey
= NULL;
148
if ((result = obj_rsakey_get_pub_blob(hVerifyKey, &pubKeySize, &
pubKey
)))
161
result |= Trspi_HashUpdate(&hashCtx, pubKeySize,
pubKey
);
172
if ((result = RPC_CMK_CreateTicket(hContext, pubKeySize,
pubKey
, sigData, sigSize, sig,
190
free_tspi(hContext,
pubKey
);
252
free(tpmMigKeyAuth.migrationKey.
pubKey
.key);
tspi_key.c
485
pubLen = keyContainer.
pubKey
.keyLength;
641
BYTE *
pubKey
= NULL;
671
/* Get associated
pubKey
*/
672
if ((result = obj_rsakey_get_pub_blob(hTssKey, &pubKeyLen, &
pubKey
)))
678
LogDebugData(pubKeyLen,
pubKey
);
679
result |= Trspi_HashUpdate(&hashCtx, pubKeyLen,
pubKey
);
683
free_tspi(tspContext,
pubKey
);
689
free_tspi(tspContext,
pubKey
);
693
if ((result = RPC_KeyControlOwner(tspContext, hTcsKey, pubKeyLen,
pubKey
, tpmAttribName,
695
free_tspi(tspContext,
pubKey
);
[
all
...]
/src/crypto/external/cpl/trousers/dist/src/tcs/rpc/tcstp/
rpc_maint.c
212
BYTE *
pubKey
;
230
pubKey
= (BYTE *)malloc(pubKeySize);
231
if (
pubKey
== NULL) {
236
if (getData(TCSD_PACKET_TYPE_PBYTE, 3,
pubKey
, pubKeySize, &data->comm)) {
237
free(
pubKey
);
243
result = TCSP_LoadManuMaintPub_Internal(hContext, antiReplay, pubKeySize,
pubKey
,
247
free(
pubKey
);
rpc_key.c
68
BYTE *
pubKey
;
93
result = TCSP_GetPubKey_Internal(hContext, hKey, pAuth, &pubKeySize, &
pubKey
);
102
free(
pubKey
);
106
free(
pubKey
);
109
if (setData(TCSD_PACKET_TYPE_PBYTE, i++,
pubKey
, pubKeySize, &data->comm)) {
110
free(
pubKey
);
113
free(
pubKey
);
/src/crypto/external/cpl/trousers/dist/src/tcs/
tcsi_ps.c
610
TCPA_STORE_PUBKEY
pubKey
;
613
pubKey
.key = NULL;
620
pubKey
.keyLength = ulPublicInfoLength;
621
pubKey
.key = malloc(
pubKey
.keyLength);
622
if (
pubKey
.key == NULL) {
623
LogError("malloc of %d bytes failed.",
pubKey
.keyLength);
627
memcpy(
pubKey
.key, rgbPublicInfo,
pubKey
.keyLength);
629
if ((result = ps_get_key_by_pub(&
pubKey
, keySize, keyBlob)))
[
all
...]
/src/crypto/external/cpl/trousers/dist/src/include/
trousers_types.h
116
TPM_STORE_PUBKEY
pubKey
;
/src/external/apache2/mDNSResponder/dist/Clients/dnssdutil/
DNSServerDNSSEC.c
31
check_compile_time( offsetof( DNSKey ## ALG_NAME ## Info,
pubKey
) == sizeof( dns_fixed_fields_dnskey ) ); \
45
uint8_t
pubKey
[ kRSASHA1_PublicKeyBytes ]; // Public key.
63
uint8_t
pubKey
[ kRSASHA256_PublicKeyBytes ]; // Public key.
81
uint8_t
pubKey
[ kRSASHA512_PublicKeyBytes ]; // Public key.
99
uint8_t
pubKey
[ kECDSAP256SHA256_PublicKeyBytes ]; // Public key.
117
uint8_t
pubKey
[ kECDSAP384SHA384_PublicKeyBytes ]; // Public key.
131
uint8_t
pubKey
[ kEd25519_PublicKeyBytes ]; // Public key.
194
.
pubKey
=
296
.
pubKey
=
401
.
pubKey
[
all
...]
/src/crypto/external/bsd/openssh/dist/
ssh-pkcs11.c
1160
* Expect either a raw 32 byte
pubkey
or an OCTET STRING with
1161
* a 32 byte
pubkey
in CKA_VALUE
1646
CK_OBJECT_HANDLE
pubKey
, privKey;
1687
&
pubKey
, &privKey)) != CKR_OK) {
1693
return pkcs11_fetch_rsa_pubkey(p, slotidx, &
pubKey
);
1767
CK_OBJECT_HANDLE
pubKey
, privKey;
1817
&
pubKey
, &privKey)) != CKR_OK) {
1823
return pkcs11_fetch_ecdsa_pubkey(p, slotidx, &
pubKey
);
/src/crypto/external/cpl/trousers/dist/src/include/tss/
tpm.h
835
TPM_STORE_PUBKEY
pubKey
;
864
TPM_STORE_PUBKEY
pubKey
;
881
TPM_STORE_PUBKEY
pubKey
;
Completed in 36 milliseconds
Indexes created Sat Feb 28 05:31:39 UTC 2026