/external/boringssl/src/crypto/x509/ |
x509rset.c | 76 int X509_REQ_set_pubkey(X509_REQ *x, EVP_PKEY *pkey) 80 return (X509_PUBKEY_set(&x->req_info->pubkey, pkey));
|
a_sign.c | 69 EVP_PKEY *pkey, const EVP_MD *type) 73 if (!EVP_DigestSignInit(&ctx, NULL, type, NULL, pkey)) { 84 EVP_PKEY *pkey; local 88 pkey = EVP_PKEY_CTX_get0_pkey(ctx->pctx); 99 outl = EVP_PKEY_size(pkey);
|
a_verify.c | 74 ASN1_BIT_STRING *signature, void *asn, EVP_PKEY *pkey) 80 if (!pkey) { 92 if (!x509_digest_verify_init(&ctx, a, pkey)) {
|
x509_r2x.c | 66 X509 *X509_REQ_to_X509(X509_REQ *r, int days, EVP_PKEY *pkey) 109 if (!res || !X509_sign(ret, pkey, EVP_md5()))
|
t_req.c | 83 EVP_PKEY *pkey; local 126 pkey = X509_REQ_get_pubkey(x); 127 if (pkey == NULL) { 131 EVP_PKEY_print_public(bio, pkey, 16, NULL); 132 EVP_PKEY_free(pkey);
|
x_all.c | 80 int X509_sign(X509 *x, EVP_PKEY *pkey, const EVP_MD *md) 84 x->sig_alg, x->signature, x->cert_info, pkey, md)); 95 int X509_REQ_sign(X509_REQ *x, EVP_PKEY *pkey, const EVP_MD *md) 98 x->signature, x->req_info, pkey, md)); 108 int X509_CRL_sign(X509_CRL *x, EVP_PKEY *pkey, const EVP_MD *md) 112 x->sig_alg, x->signature, x->crl, pkey, md)); 123 int NETSCAPE_SPKI_sign(NETSCAPE_SPKI *x, EVP_PKEY *pkey, const EVP_MD *md) 126 x->signature, x->spkac, pkey, md)); 129 int NETSCAPE_SPKI_verify(NETSCAPE_SPKI *x, EVP_PKEY *pkey) 132 x->signature, x->spkac, pkey)); [all...] |
/external/google-tv-pairing-protocol/cpp/src/polo/util/ |
certificateutil.h | 50 // @param pkey the private key 53 static std::string PKEYToPEM(EVP_PKEY* pkey, 61 // @param pkey the private key 65 static X509* GenerateSelfSignedCert(EVP_PKEY* pkey,
|
/external/boringssl/src/include/openssl/ |
evp.h | 88 // EVP_PKEY_free frees all data referenced by |pkey| and then frees |pkey| 90 OPENSSL_EXPORT void EVP_PKEY_free(EVP_PKEY *pkey); 92 // EVP_PKEY_up_ref increments the reference count of |pkey| and returns one. 93 OPENSSL_EXPORT int EVP_PKEY_up_ref(EVP_PKEY *pkey); 95 // EVP_PKEY_is_opaque returns one if |pkey| is opaque. Opaque keys are backed by 98 OPENSSL_EXPORT int EVP_PKEY_is_opaque(const EVP_PKEY *pkey); 111 // EVP_PKEY_missing_parameters returns one if |pkey| is missing needed 113 OPENSSL_EXPORT int EVP_PKEY_missing_parameters(const EVP_PKEY *pkey); 116 // |pkey|. For an RSA key, this returns the number of bytes needed to represen 815 } pkey; member in struct:evp_pkey_st [all...] |
/external/boringssl/src/crypto/evp/ |
p_ed25519.c | 29 ED25519_KEY *key = ctx->pkey->pkey.ptr; 46 ED25519_KEY *key = ctx->pkey->pkey.ptr;
|
evp_ctx.c | 87 static EVP_PKEY_CTX *evp_pkey_ctx_new(EVP_PKEY *pkey, ENGINE *e, int id) { 92 if (!pkey || !pkey->ameth) { 95 id = pkey->ameth->pkey_id; 117 if (pkey) { 118 EVP_PKEY_up_ref(pkey); 119 ret->pkey = pkey; 124 EVP_PKEY_free(ret->pkey); 133 EVP_PKEY_CTX *EVP_PKEY_CTX_new(EVP_PKEY *pkey, ENGINE *e) [all...] |
sign.c | 78 unsigned int *out_sig_len, EVP_PKEY *pkey) { 84 size_t sig_len = EVP_PKEY_size(pkey); 94 pkctx = EVP_PKEY_CTX_new(pkey, NULL); 124 EVP_PKEY *pkey) { 139 pkctx = EVP_PKEY_CTX_new(pkey, NULL);
|
p_rsa.c | 164 ctx->tbuf = OPENSSL_malloc(EVP_PKEY_size(pk->pkey)); 174 RSA *rsa = ctx->pkey->pkey.rsa; 175 const size_t key_len = EVP_PKEY_size(ctx->pkey); 213 RSA *rsa = ctx->pkey->pkey.rsa; 230 const size_t key_len = EVP_PKEY_size(ctx->pkey); 246 RSA *rsa = ctx->pkey->pkey.rsa; 247 const size_t key_len = EVP_PKEY_size(ctx->pkey); [all...] |
/system/keymaster/km_openssl/ |
asymmetric_key.cpp | 44 EVP_PKEY_Ptr pkey(EVP_PKEY_new()); 45 if (!InternalToEvp(pkey.get())) 48 int key_data_length = i2d_PUBKEY(pkey.get(), NULL); 57 if (i2d_PUBKEY(pkey.get(), &tmp) != key_data_length) {
|
asymmetric_key_factory.cpp | 54 EVP_PKEY* pkey = local 55 d2i_PrivateKey(evp_key_type(), NULL /* pkey */, &tmp, 57 if (!pkey) 59 UniquePtr<EVP_PKEY, EVP_PKEY_Delete> pkey_deleter(pkey); 61 if (!asym_key->EvpToInternal(pkey))
|
/external/iproute2/ip/ |
iplink_ipoib.c | 25 "Usage: ... ipoib [ pkey PKEY ]\n" 29 "PKEY := 0x8001-0xffff\n" 47 __u16 pkey, mode, umcast; local 50 if (matches(*argv, "pkey") == 0) { 52 if (get_u16(&pkey, *argv, 0)) 53 invarg("pkey is invalid", *argv); 54 addattr_l(n, 1024, IFLA_IPOIB_PKEY, &pkey, 2); 94 __u16 pkey = rta_getattr_u16(tb[IFLA_IPOIB_PKEY]); 99 snprintf(b1, sizeof(b1), "%#.4x", pkey); [all...] |
/external/python/cpython3/Modules/ |
hashtable.c | 108 _Py_hashtable_hash_ptr(struct _Py_hashtable_t *ht, const void *pkey) 112 _Py_HASHTABLE_READ_KEY(ht, pkey, key); 118 _Py_hashtable_compare_direct(_Py_hashtable_t *ht, const void *pkey, 122 return (memcmp(pkey, pkey2, ht->key_size) == 0); 254 size_t key_size, const void *pkey) 262 key_hash = ht->hash_func(ht, pkey); 266 if (entry->key_hash == key_hash && ht->compare_func(ht, pkey, entry)) 275 _Py_hashtable_pop_entry(_Py_hashtable_t *ht, size_t key_size, const void *pkey, 284 key_hash = ht->hash_func(ht, pkey); 289 if (entry->key_hash == key_hash && ht->compare_func(ht, pkey, entry) 514 const void *pkey = _Py_HASHTABLE_ENTRY_PKEY(entry); local [all...] |
hashtable.h | 41 /* Get a key value from pkey: use memcpy() rather than a pointer dereference 43 #define _Py_HASHTABLE_READ_KEY(TABLE, PKEY, DST_KEY) \ 46 memcpy(&(DST_KEY), (PKEY), sizeof(DST_KEY)); \ 76 const void *pkey); 78 const void *pkey, 107 const void *pkey); 112 const void *pkey, 158 const void *pkey, 177 const void *pkey); 190 const void *pkey, [all...] |
/system/keymaster/include/keymaster/km_openssl/ |
ec_key.h | 36 bool InternalToEvp(EVP_PKEY* pkey) const override; 37 bool EvpToInternal(const EVP_PKEY* pkey) override;
|
rsa_key.h | 32 bool InternalToEvp(EVP_PKEY* pkey) const override; 33 bool EvpToInternal(const EVP_PKEY* pkey) override;
|
/external/webrtc/webrtc/base/ |
opensslidentity.cc | 48 EVP_PKEY* pkey = EVP_PKEY_new(); local 53 if (!pkey || !exponent || !rsa || 56 !EVP_PKEY_assign_RSA(pkey, rsa)) { 57 EVP_PKEY_free(pkey); 68 if (!pkey || !ec_key || !EC_KEY_generate_key(ec_key) || 69 !EVP_PKEY_assign_EC_KEY(pkey, ec_key)) { 70 EVP_PKEY_free(pkey); 78 EVP_PKEY_free(pkey); 83 EVP_PKEY_free(pkey); 89 return pkey; 165 EVP_PKEY* pkey = MakeKey(key_params); local 448 EVP_PKEY* pkey = local [all...] |
opensslidentity.h | 31 explicit OpenSSLKeyPair(EVP_PKEY* pkey) : pkey_(pkey) { 41 EVP_PKEY* pkey() const { return pkey_; } function in class:rtc::OpenSSLKeyPair
|
/system/iot/attestation/atap/ops/ |
openssl_ops.cpp | 59 EC_KEY* pkey = NULL; local 88 pkey = d2i_ECPrivateKey(nullptr, &buf_ptr, test_key_size_); 89 EC_KEY_set_group(pkey, group); 91 pkey = EC_KEY_new(); 92 if (!pkey) { 97 if (1 != EC_KEY_set_group(pkey, group)) { 102 if (1 != EC_KEY_generate_key(pkey)) { 108 const EC_POINT* public_point = EC_KEY_get0_public_key(pkey); 123 pkey, 138 if (pkey) EC_KEY_free(pkey) [all...] |
/external/boringssl/src/crypto/pkcs8/ |
pkcs8_x509.c | 83 if (key->pkey && key->pkey->type == V_ASN1_OCTET_STRING && 84 key->pkey->value.octet_string) { 85 OPENSSL_cleanse(key->pkey->value.octet_string->data, 86 key->pkey->value.octet_string->length); 95 ASN1_SIMPLE(PKCS8_PRIV_KEY_INFO, pkey, ASN1_ANY), 122 PKCS8_PRIV_KEY_INFO *EVP_PKEY2PKCS8(EVP_PKEY *pkey) { 127 !EVP_marshal_private_key(&cbb, pkey) || 161 EVP_PKEY *pkey = NULL; 172 pkey = PKCS8_parse_encrypted_private_key(&cbs, pass, pass_len) 319 EVP_PKEY *pkey = PKCS8_parse_encrypted_private_key( local 770 EVP_PKEY *pkey = NULL; local [all...] |
/external/conscrypt/platform/src/main/java/org/conscrypt/ |
CertificatePriorityComparator.java | 147 private int getKeySize(PublicKey pkey) { 148 if (pkey instanceof ECPublicKey) { 149 return ((ECPublicKey) pkey).getParams().getCurve().getField().getFieldSize(); 150 } else if (pkey instanceof RSAPublicKey) { 151 return ((RSAPublicKey) pkey).getModulus().bitLength(); 154 "Unsupported public key type: " + pkey.getClass().getName());
|
/external/nos/host/android/hals/keymaster/ |
export_key.cpp | 72 bssl::UniquePtr<EVP_PKEY> pkey(EVP_PKEY_new()); 73 EVP_PKEY_set1_RSA(pkey.get(), rsa.get()); 74 if (!EVP_marshal_public_key(&cbb, pkey.get())) { 152 bssl::UniquePtr<EVP_PKEY> pkey(EVP_PKEY_new()); 153 if (!pkey.get()) { 157 if (!EVP_PKEY_set1_EC_KEY(pkey.get(), ec_key.get())) { 164 if (!EVP_marshal_public_key(&cbb, pkey.get())) {
|