/development/tools/ |
make_key | 68 openssl pkcs8 -in ${one} -topk8 -outform DER -out $1.pk8 -nocrypt 72 openssl pkcs8 -in ${one} -topk8 -outform DER -out $1.pk8 \
|
/external/boringssl/src/crypto/evp/ |
p_ed25519_asn1.c | 127 CBB pkcs8, algorithm, oid, private_key, inner; local 128 if (!CBB_add_asn1(out, &pkcs8, CBS_ASN1_SEQUENCE) || 129 !CBB_add_asn1_uint64(&pkcs8, 0 /* version */) || 130 !CBB_add_asn1(&pkcs8, &algorithm, CBS_ASN1_SEQUENCE) || 133 !CBB_add_asn1(&pkcs8, &private_key, CBS_ASN1_OCTETSTRING) ||
|
p_rsa_asn1.c | 117 CBB pkcs8, algorithm, oid, null, private_key; local 118 if (!CBB_add_asn1(out, &pkcs8, CBS_ASN1_SEQUENCE) || 119 !CBB_add_asn1_uint64(&pkcs8, 0 /* version */) || 120 !CBB_add_asn1(&pkcs8, &algorithm, CBS_ASN1_SEQUENCE) || 124 !CBB_add_asn1(&pkcs8, &private_key, CBS_ASN1_OCTETSTRING) ||
|
p_dsa_asn1.c | 177 CBB pkcs8, algorithm, oid, private_key; local 178 if (!CBB_add_asn1(out, &pkcs8, CBS_ASN1_SEQUENCE) || 179 !CBB_add_asn1_uint64(&pkcs8, 0 /* version */) || 180 !CBB_add_asn1(&pkcs8, &algorithm, CBS_ASN1_SEQUENCE) || 184 !CBB_add_asn1(&pkcs8, &private_key, CBS_ASN1_OCTETSTRING) ||
|
p_ec_asn1.c | 174 CBB pkcs8, algorithm, oid, private_key; local 175 if (!CBB_add_asn1(out, &pkcs8, CBS_ASN1_SEQUENCE) || 176 !CBB_add_asn1_uint64(&pkcs8, 0 /* version */) || 177 !CBB_add_asn1(&pkcs8, &algorithm, CBS_ASN1_SEQUENCE) || 181 !CBB_add_asn1(&pkcs8, &private_key, CBS_ASN1_OCTETSTRING) ||
|
evp_asn1.c | 154 CBS pkcs8, algorithm, key; local 157 if (!CBS_get_asn1(cbs, &pkcs8, CBS_ASN1_SEQUENCE) || 158 !CBS_get_asn1_uint64(&pkcs8, &version) || 160 !CBS_get_asn1(&pkcs8, &algorithm, CBS_ASN1_SEQUENCE) || 161 !CBS_get_asn1(&pkcs8, &key, CBS_ASN1_OCTETSTRING)) {
|
/build/make/tools/signapk/test/ |
run | 20 umask 0077 && openssl pkcs8 -topk8 -nocrypt \
|
/external/wpa_supplicant_8/src/tls/ |
Makefile | 22 pkcs8.o \
|
/cts/apps/CtsVerifier/ |
create_test_certs.sh | 61 && openssl pkcs8 \
|
/external/nos/host/android/hals/keymaster/test/ |
import_key_test.cpp | 29 #include <openssl/pkcs8.h> 347 bssl::UniquePtr<PKCS8_PRIV_KEY_INFO> pkcs8; local 354 pkcs8.reset(EVP_PKEY2PKCS8(pkey.get())); 355 EXPECT_NE(pkcs8.get(), nullptr); 357 int len = i2d_PKCS8_PRIV_KEY_INFO(pkcs8.get(), NULL); 360 EXPECT_EQ(i2d_PKCS8_PRIV_KEY_INFO(pkcs8.get(), &tmp), len); 381 hidl_vec<KeyParameter>{kp}, KeyFormat::PKCS8, der_vec, 394 // TODO: add negative tests for PKCS8 RSA
|
/external/boringssl/src/include/openssl/ |
pkcs8.h | 110 OPENSSL_EXPORT PKCS8_PRIV_KEY_INFO *PKCS8_decrypt(X509_SIG *pkcs8,
|
/external/boringssl/src/tool/ |
pkcs12.cc | 36 #include <openssl/pkcs8.h>
|
/external/nos/host/android/hals/keymaster/ |
import_key.cpp | 26 #include <openssl/pkcs8.h> 50 bssl::UniquePtr<PKCS8_PRIV_KEY_INFO> pkcs8( 52 if (pkcs8.get() == NULL) { 57 return EVP_PKCS82PKEY(pkcs8.get()); 80 LOG(ERROR) << "ImportKey request: failed to parse PKCS8"; 86 LOG(ERROR) << "ImportKey request: PKCS8 key is not RSA"; 92 // If specified, key size must match the PKCS8 blob. 102 // If specified, the public exponent must match the PKCS8 blob. 156 LOG(ERROR) << "ImportKey request: failed to parse PKCS8"; 162 LOG(ERROR) << "ImportKey request: PKCS8 key is not EC" [all...] |
import_wrapped_key.cpp | 28 #include <openssl/pkcs8.h> 61 // TODO: update max once PKCS8 support is introduced.
|
/cts/hostsidetests/devicepolicy/app/DeviceAndProfileOwner/scripts/ |
generate-client-cert-chain.sh | 89 openssl pkcs8 \
|
/external/boringssl/ |
eureka.mk | 136 src/crypto/pkcs8/p5_pbev2.c\ 137 src/crypto/pkcs8/pkcs8.c\ 138 src/crypto/pkcs8/pkcs8_x509.c\
|
sources.mk | 136 src/crypto/pkcs8/p5_pbev2.c\ 137 src/crypto/pkcs8/pkcs8.c\ 138 src/crypto/pkcs8/pkcs8_x509.c\
|
/external/boringssl/src/crypto/pem/ |
pem_pk8.c | 64 #include <openssl/pkcs8.h> 254 IMPLEMENT_PEM_rw(PKCS8, X509_SIG, PEM_STRING_PKCS8, X509_SIG)
|
pem_pkey.c | 68 #include <openssl/pkcs8.h>
|
/external/boringssl/src/crypto/pkcs8/ |
p5_pbev2.c | 56 #include <openssl/pkcs8.h> 138 OPENSSL_PUT_ERROR(PKCS8, PKCS8_R_UNSUPPORTED_CIPHER); 148 OPENSSL_PUT_ERROR(PKCS8, PKCS8_R_ERROR_SETTING_CIPHER_PARAMS); 166 OPENSSL_PUT_ERROR(PKCS8, PKCS8_R_CIPHER_HAS_NO_OBJECT_IDENTIFIER); 219 OPENSSL_PUT_ERROR(PKCS8, PKCS8_R_DECODE_ERROR); 225 OPENSSL_PUT_ERROR(PKCS8, PKCS8_R_UNSUPPORTED_KEY_DERIVATION_FUNCTION); 232 OPENSSL_PUT_ERROR(PKCS8, PKCS8_R_UNSUPPORTED_CIPHER); 243 OPENSSL_PUT_ERROR(PKCS8, PKCS8_R_DECODE_ERROR); 248 OPENSSL_PUT_ERROR(PKCS8, PKCS8_R_BAD_ITERATION_COUNT); 257 OPENSSL_PUT_ERROR(PKCS8, PKCS8_R_DECODE_ERROR) [all...] |
pkcs8_x509.c | 56 #include <openssl/pkcs8.h> 128 OPENSSL_PUT_ERROR(PKCS8, PKCS8_R_DECODE_ERROR); 147 OPENSSL_PUT_ERROR(PKCS8, PKCS8_R_ENCODE_ERROR); 155 OPENSSL_PUT_ERROR(PKCS8, PKCS8_R_DECODE_ERROR); 167 PKCS8_PRIV_KEY_INFO *PKCS8_decrypt(X509_SIG *pkcs8, const char *pass, 181 int in_len = i2d_X509_SIG(pkcs8, &in); 234 OPENSSL_PUT_ERROR(PKCS8, ERR_R_INTERNAL_ERROR); 266 OPENSSL_PUT_ERROR(PKCS8, PKCS8_R_BAD_PKCS12_DATA); 273 OPENSSL_PUT_ERROR(PKCS8, PKCS8_R_BAD_PKCS12_DATA); 280 OPENSSL_PUT_ERROR(PKCS8, PKCS8_R_BAD_PKCS12_DATA) [all...] |
pkcs8.c | 56 #include <openssl/pkcs8.h> 79 OPENSSL_PUT_ERROR(PKCS8, ERR_R_MALLOC_FAILURE); 91 OPENSSL_PUT_ERROR(PKCS8, PKCS8_R_INVALID_CHARACTERS); 116 OPENSSL_PUT_ERROR(PKCS8, PKCS8_R_BAD_ITERATION_COUNT); 152 OPENSSL_PUT_ERROR(PKCS8, ERR_R_OVERFLOW); 159 OPENSSL_PUT_ERROR(PKCS8, ERR_R_OVERFLOW); 165 OPENSSL_PUT_ERROR(PKCS8, ERR_R_MALLOC_FAILURE); 247 OPENSSL_PUT_ERROR(PKCS8, PKCS8_R_KEY_GEN_ERROR); 267 OPENSSL_PUT_ERROR(PKCS8, PKCS8_R_DECODE_ERROR); 272 OPENSSL_PUT_ERROR(PKCS8, PKCS8_R_BAD_ITERATION_COUNT) [all...] |
pkcs8_test.cc | 19 #include <openssl/pkcs8.h> 28 // openssl pkcs8 -topk8 -in test.key -out test.key.encrypted -v2 des3 -outform der
|
/external/boringssl/src/ssl/test/ |
test_config.cc | 1687 std::string dc, pkcs8; local [all...] |
/external/openssh/regress/unittests/sshkey/ |
mktestdata.sh | 10 ssh-keygen -f $_in -e -m pkcs8 | \
|