/system/keymaster/km_openssl/ |
ec_key_factory.cpp | 95 UniquePtr<EVP_PKEY, EVP_PKEY_Delete> pkey(EVP_PKEY_new()); 96 if (ec_key.get() == NULL || pkey.get() == NULL) 115 if (EVP_PKEY_set1_EC_KEY(pkey.get(), ec_key.get()) != 1) 119 error = EvpKeyToKeyMaterial(pkey.get(), &key_material); 155 UniquePtr<EVP_PKEY, EVP_PKEY_Delete> pkey; 157 KeyMaterialToEvpKey(key_format, key_material, keymaster_key_type(), &pkey); 161 UniquePtr<EC_KEY, EC_KEY_Delete> ec_key(EVP_PKEY_get1_EC_KEY(pkey.get()));
|
rsa_key_factory.cpp | 83 UniquePtr<EVP_PKEY, EVP_PKEY_Delete> pkey(EVP_PKEY_new()); 84 if (exponent.get() == NULL || rsa_key.get() == NULL || pkey.get() == NULL) 91 if (EVP_PKEY_set1_RSA(pkey.get(), rsa_key.get()) != 1) 95 keymaster_error_t error = EvpKeyToKeyMaterial(pkey.get(), &key_material); 133 UniquePtr<EVP_PKEY, EVP_PKEY_Delete> pkey; 135 KeyMaterialToEvpKey(key_format, key_material, keymaster_key_type(), &pkey); 139 UniquePtr<RSA, RsaKey::RSA_Delete> rsa_key(EVP_PKEY_get1_RSA(pkey.get()));
|
/external/boringssl/src/ssl/ |
ssl_file.cc | 337 EVP_PKEY *pkey = NULL; local 352 pkey = PEM_read_bio_PrivateKey(in, NULL, ssl->ctx->default_passwd_callback, 356 pkey = d2i_PrivateKey_bio(in, NULL); 362 if (pkey == NULL) { 366 ret = SSL_use_PrivateKey(ssl, pkey); 367 EVP_PKEY_free(pkey); 459 EVP_PKEY *pkey = NULL; local 474 pkey = PEM_read_bio_PrivateKey(in, NULL, ctx->default_passwd_callback, 478 pkey = d2i_PrivateKey_bio(in, NULL); 484 if (pkey == NULL) [all...] |
/system/keymaster/legacy_support/ |
ecdsa_keymaster1_operation.cpp | 90 UniquePtr<EVP_PKEY, EVP_PKEY_Delete> pkey(EVP_PKEY_new()); 91 if (!key.InternalToEvp(pkey.get())) { 95 return pkey.release();
|
rsa_keymaster1_operation.cpp | 106 UniquePtr<EVP_PKEY, EVP_PKEY_Delete> pkey(EVP_PKEY_new()); 107 if (!key.InternalToEvp(pkey.get())) { 111 return pkey.release();
|
/toolchain/binutils/binutils-2.27/gold/ |
stringpool.cc | 144 // pointer to the canonical string. If PKEY is not NULL, set *PKEY to 214 Key* pkey) 216 return this->add_with_length(s, string_length(s), copy, pkey); 243 Key* pkey) 272 if (pkey != NULL) 273 *pkey = p->second; 286 if (pkey != NULL) 287 *pkey = p->second; 302 if (pkey != NULL [all...] |
stringpool.h | 217 // is copied into permanent storage. If PKEY is not NULL, this sets 218 // *PKEY to the key for the string. 220 add(const Stringpool_char* s, bool copy, Key* pkey); 224 add(const std::basic_string<Stringpool_char>& s, bool copy, Key* pkey) 225 { return this->add_with_length(s.data(), s.size(), copy, pkey); } 230 add_with_length(const Stringpool_char* s, size_t len, bool copy, Key* pkey); 233 // string pointer. Otherwise, return NULL. If PKEY is not NULL, 234 // set *PKEY to the key. 236 find(const Stringpool_char* s, Key* pkey) const;
|
/bionic/libc/kernel/uapi/rdma/ |
ib_user_sa.h | 45 __be16 pkey; member in struct:ib_user_path_rec
|
/external/compiler-rt/lib/sanitizer_common/tests/ |
sanitizer_allocator_testlib.cc | 52 static pthread_key_t pkey; member in namespace:__anon17201 56 pthread_setspecific(pkey, (void*)((uptr)v + 1)); 66 pthread_key_create(&pkey, thread_dtor); 69 pthread_setspecific(pkey, (void*)1);
|
/external/kernel-headers/original/uapi/rdma/ |
ib_user_sa.h | 64 __be16 pkey; member in struct:ib_user_path_rec
|
/external/libchrome/crypto/ |
rsa_private_key.cc | 49 bssl::UniquePtr<EVP_PKEY> pkey(EVP_parse_private_key(&cbs)); 50 if (!pkey || CBS_len(&cbs) != 0 || EVP_PKEY_id(pkey.get()) != EVP_PKEY_RSA) 54 result->key_ = std::move(pkey);
|
/external/linux-kselftest/tools/testing/selftests/x86/ |
pkey-helpers.h | 113 static inline void __pkey_access_allow(int pkey, int do_allow) 116 int bit = pkey * 2; 127 static inline void __pkey_write_allow(int pkey, int do_allow_write) 130 int bit = pkey * 2 + 1;
|
/external/syslinux/gpxe/src/arch/i386/include/gpxe/ |
sbft.h | 102 uint16_t pkey; member in struct:sbft_ib_subtable
|
/external/syslinux/gpxe/src/include/gpxe/ |
ib_srp.h | 63 uint16_t pkey; member in struct:ib_srp_parameters
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/rdma/ |
ib_user_sa.h | 63 __be16 pkey; member in struct:ib_user_path_rec
|
/external/boringssl/src/crypto/x509/ |
x509spki.c | 64 int NETSCAPE_SPKI_set_pubkey(NETSCAPE_SPKI *x, EVP_PKEY *pkey) 68 return (X509_PUBKEY_set(&(x->spkac->pubkey), pkey));
|
x509_test.cc | [all...] |
x509_set.c | 154 int X509_set_pubkey(X509 *x, EVP_PKEY *pkey) 158 return (X509_PUBKEY_set(&(x->cert_info->key), pkey));
|
/external/syslinux/gpxe/src/arch/i386/interface/pcbios/ |
sbft.c | 95 sbft_ib->pkey = ib_params->pkey;
|
/external/boringssl/src/crypto/evp/ |
digestsign.c | 80 const EVP_MD *type, ENGINE *e, EVP_PKEY *pkey, 83 ctx->pctx = EVP_PKEY_CTX_new(pkey, e); 122 ENGINE *e, EVP_PKEY *pkey) { 123 return do_sigver_init(ctx, pctx, type, e, pkey, evp_sign); 127 const EVP_MD *type, ENGINE *e, EVP_PKEY *pkey) { 128 return do_sigver_init(ctx, pctx, type, e, pkey, evp_verify);
|
internal.h | 110 void (*pkey_free)(EVP_PKEY *pkey); 181 EVP_PKEY *pkey; member in struct:evp_pkey_ctx_st 197 int (*keygen)(EVP_PKEY_CTX *ctx, EVP_PKEY *pkey);
|
/external/e2fsprogs/lib/ext2fs/ |
tdbtool.c | 399 static void first_record(TDB_CONTEXT *the_tdb, TDB_DATA *pkey) 402 *pkey = tdb_firstkey(the_tdb); 404 dbuf = tdb_fetch(the_tdb, *pkey); 407 print_rec(the_tdb, *pkey, dbuf, NULL); 411 static void next_record(TDB_CONTEXT *the_tdb, TDB_DATA *pkey) 414 *pkey = tdb_nextkey(the_tdb, *pkey); 416 dbuf = tdb_fetch(the_tdb, *pkey); 420 print_rec(the_tdb, *pkey, dbuf, NULL);
|
/external/syslinux/gpxe/src/net/infiniband/ |
ib_srp.c | 219 int pkey; local 221 if ( ( pkey = ib_srp_parse_integer ( rp_comp, IB_PKEY_DEFAULT ) ) < 0 ) 222 return pkey; 223 rp->ib->pkey = pkey;
|
/system/security/keystore-engine/ |
android_engine.cpp | 374 Unique_EVP_PKEY pkey(d2i_PUBKEY(NULL, &inp, pubkey_len)); 375 if (pkey.get() == NULL) { 381 switch (EVP_PKEY_type(pkey->type)) { 383 Unique_RSA public_rsa(EVP_PKEY_get1_RSA(pkey.get())); 388 Unique_EC_KEY public_ecdsa(EVP_PKEY_get1_EC_KEY(pkey.get())); 393 ALOGE("Unsupported key type %d", EVP_PKEY_type(pkey->type));
|
/external/conscrypt/common/src/main/java/org/conscrypt/ |
OpenSSLX509Certificate.java | 375 private void verifyOpenSSL(OpenSSLKey pkey) throws CertificateException, 379 NativeCrypto.X509_verify(mContext, this, pkey.getNativeRef()); 408 OpenSSLKey pkey = ((OpenSSLKeyHolder) key).getOpenSSLKey(); local 409 verifyOpenSSL(pkey); 430 OpenSSLKey pkey = ((OpenSSLKeyHolder) key).getOpenSSLKey(); local 431 verifyOpenSSL(pkey); 465 OpenSSLKey pkey = new OpenSSLKey(NativeCrypto.X509_get_pubkey(mContext, this)); local 466 return pkey.getPublicKey();
|