/external/boringssl/src/include/openssl/ |
hkdf.h | 27 * |out_key|. It returns one on success and zero on error. 32 OPENSSL_EXPORT int HKDF(uint8_t *out_key, size_t out_len, const EVP_MD *digest,
|
ec_key.h | 181 * at |*inp|. If |out_key| is not NULL then, on exit, a pointer to the result 182 * is in |*out_key|. If |*out_key| is already non-NULL on entry then the result 183 * is written directly into |*out_key|, otherwise a fresh |EC_KEY| is 186 OPENSSL_EXPORT EC_KEY *d2i_ECPrivateKey(EC_KEY **out_key, const uint8_t **inp, 196 * |len| bytes at |*inp|. If |out_key| is not NULL then, on exit, a pointer to 197 * the result is in |*out_key|. If |*out_key| is already non-NULL on entry then 198 * the result is written directly into |*out_key|, otherwise a fresh |EC_KEY| 201 OPENSSL_EXPORT EC_KEY *d2i_ECParameters(EC_KEY **out_key, const uint8_t **inp [all...] |
pkcs8.h | 110 * and decrypts it using |password|, sets |*out_key| to the included private 113 OPENSSL_EXPORT int PKCS12_get_key_and_certs(EVP_PKEY **out_key,
|
aead.h | 320 /* EVP_AEAD_CTX_get_rc4_state sets |*out_key| to point to an RC4 key structure. 323 const RC4_KEY **out_key);
|
evp.h | 390 * and |salt|, using |digest|, and outputs |key_len| bytes to |out_key|. It 395 size_t key_len, uint8_t *out_key); 402 size_t key_len, uint8_t *out_key); [all...] |
/external/boringssl/src/crypto/evp/ |
pbkdf.c | 65 const EVP_MD *digest, size_t key_len, uint8_t *out_key) { 74 p = out_key; 131 // value, expecting it to succeed and unconditonally using |out_key|. 148 uint8_t *out_key) { 150 EVP_sha1(), key_len, out_key);
|
/external/boringssl/src/crypto/hkdf/ |
hkdf.c | 24 int HKDF(uint8_t *out_key, size_t out_len, 77 memcpy(out_key + done, previous, todo);
|
/external/boringssl/src/crypto/cipher/ |
aead.c | 152 int EVP_AEAD_CTX_get_rc4_state(const EVP_AEAD_CTX *ctx, const RC4_KEY **out_key) { 157 return ctx->aead->get_rc4_state(ctx, out_key);
|
internal.h | 98 int (*get_rc4_state)(const EVP_AEAD_CTX *ctx, const RC4_KEY **out_key);
|
e_ssl3.c | 300 static int aead_ssl3_get_rc4_state(const EVP_AEAD_CTX *ctx, const RC4_KEY **out_key) { 306 *out_key = (RC4_KEY*) ssl3_ctx->cipher_ctx.cipher_data;
|
e_tls.c | 435 const RC4_KEY **out_key) { 441 *out_key = (const RC4_KEY*) tls_ctx->cipher_ctx.cipher_data;
|
/external/boringssl/src/crypto/pkcs8/ |
pkcs8.c | 664 EVP_PKEY **out_key; member in struct:pkcs12_context 821 if (*ctx->out_key) { 850 *ctx->out_key = EVP_PKCS82PKEY(pki); 853 if (ctx->out_key == NULL) { 901 int PKCS12_get_key_and_certs(EVP_PKEY **out_key, STACK_OF(X509) *out_certs, 922 *out_key = NULL; 976 ctx.out_key = out_key; 1048 EVP_PKEY_free(*out_key); 1049 *out_key = NULL [all...] |
/system/keymaster/ |
android_keymaster.cpp | 383 UniquePtr<uint8_t[]> out_key; 385 response->error = key->formatted_key_material(request.key_format, &out_key, &size); 387 response->key_data = out_key.release();
|