/external/chromium/net/base/ |
H A D | keygen_handler_openssl.cc | 20 EVP_PKEY* pkey = key->key(); local 23 OpenSSLPrivateKeyStore::GetInstance()->StorePrivateKey(url_, pkey); 29 NETSCAPE_SPKI_set_pubkey(spki.get(), pkey); 32 NETSCAPE_SPKI_sign(spki.get(), pkey, EVP_md5());
|
H A D | openssl_memory_private_key_store.cc | 36 virtual bool StorePrivateKey(const GURL& url, EVP_PKEY* pkey) { argument 37 CRYPTO_add(&pkey->references, 1, CRYPTO_LOCK_EVP_PKEY); 39 keys_.push_back(pkey); 43 virtual EVP_PKEY* FetchPrivateKey(EVP_PKEY* pkey) { argument 47 if (EVP_PKEY_cmp(*it, pkey) == 1)
|
/external/openssl/crypto/cmac/ |
H A D | cm_ameth.c | 64 static int cmac_size(const EVP_PKEY *pkey) argument 69 static void cmac_key_free(EVP_PKEY *pkey) argument 71 CMAC_CTX *cmctx = (CMAC_CTX *)pkey->pkey.ptr;
|
/external/openssl/crypto/x509/ |
H A D | x509_r2x.c | 68 X509 *X509_REQ_to_X509(X509_REQ *r, int days, EVP_PKEY *pkey) argument 104 if (!X509_sign(ret,pkey,EVP_md5()))
|
H A D | x509rset.c | 78 int X509_REQ_set_pubkey(X509_REQ *x, EVP_PKEY *pkey) argument 81 return(X509_PUBKEY_set(&x->req_info->pubkey,pkey));
|
H A D | x509type.c | 65 int X509_certificate_type(X509 *x, EVP_PKEY *pkey) argument 72 if (pkey == NULL) 75 pk=pkey; 128 if(pkey==NULL) EVP_PKEY_free(pk);
|
H A D | x509_set.c | 143 int X509_set_pubkey(X509 *x, EVP_PKEY *pkey) argument 146 return(X509_PUBKEY_set(&(x->cert_info->key),pkey));
|
H A D | x509spki.c | 63 int NETSCAPE_SPKI_set_pubkey(NETSCAPE_SPKI *x, EVP_PKEY *pkey) argument 66 return(X509_PUBKEY_set(&(x->spkac->pubkey),pkey));
|
/external/openssl/crypto/asn1/ |
H A D | t_spki.c | 75 EVP_PKEY *pkey; local 83 pkey = X509_PUBKEY_get(spki->spkac->pubkey); 84 if(!pkey) BIO_printf(out, " Unable to load public key\n"); 87 EVP_PKEY_print_public(out, pkey, 4, NULL); 88 EVP_PKEY_free(pkey);
|
H A D | a_verify.c | 78 char *data, EVP_PKEY *pkey) 116 (unsigned int)signature->length,pkey) <= 0) 135 ASN1_BIT_STRING *signature, void *asn, EVP_PKEY *pkey) 153 if (!pkey->ameth || !pkey->ameth->item_verify) 158 ret = pkey->ameth->item_verify(&ctx, it, asn, a, 159 signature, pkey); 179 if (EVP_PKEY_type(pknid) != pkey->ameth->pkey_id) 185 if (!EVP_DigestVerifyInit(&ctx, NULL, type, NULL, pkey)) 77 ASN1_verify(i2d_of_void *i2d, X509_ALGOR *a, ASN1_BIT_STRING *signature, char *data, EVP_PKEY *pkey) argument 134 ASN1_item_verify(const ASN1_ITEM *it, X509_ALGOR *a, ASN1_BIT_STRING *signature, void *asn, EVP_PKEY *pkey) argument
|
H A D | a_sign.c | 131 ASN1_BIT_STRING *signature, char *data, EVP_PKEY *pkey, 176 outll=outl=EVP_PKEY_size(pkey); 190 (unsigned int *)&outl,pkey)) 217 ASN1_BIT_STRING *signature, void *asn, EVP_PKEY *pkey, 222 if (!EVP_DigestSignInit(&ctx, NULL, type, NULL, pkey)) 236 EVP_PKEY *pkey; local 243 pkey = EVP_PKEY_CTX_get0_pkey(ctx->pctx); 245 if (!type || !pkey) 251 if (pkey->ameth->item_sign) 253 rv = pkey 130 ASN1_sign(i2d_of_void *i2d, X509_ALGOR *algor1, X509_ALGOR *algor2, ASN1_BIT_STRING *signature, char *data, EVP_PKEY *pkey, const EVP_MD *type) argument 216 ASN1_item_sign(const ASN1_ITEM *it, X509_ALGOR *algor1, X509_ALGOR *algor2, ASN1_BIT_STRING *signature, void *asn, EVP_PKEY *pkey, const EVP_MD *type) argument [all...] |
H A D | t_req.c | 97 EVP_PKEY *pkey; local 145 pkey=X509_REQ_get_pubkey(x); 146 if (pkey == NULL) 153 EVP_PKEY_print_public(bp, pkey, 16, NULL); 154 EVP_PKEY_free(pkey);
|
/external/openssl/apps/ |
H A D | pkeyparam.c | 74 EVP_PKEY *pkey=NULL; local 178 pkey = PEM_read_bio_Parameters(in, NULL); 179 if (!pkey) 187 PEM_write_bio_Parameters(out,pkey); 190 EVP_PKEY_print_params(out, pkey, 0, NULL); 195 EVP_PKEY_free(pkey);
|
H A D | pkey.c | 1 /* apps/pkey.c */ 78 EVP_PKEY *pkey=NULL; local 186 BIO_printf(bio_err, "Usage pkey [options]\n"); 231 pkey = load_pubkey(bio_err, infile, informat, 1, 234 pkey = load_key(bio_err, infile, informat, 1, 236 if (!pkey) 244 PEM_write_bio_PUBKEY(out,pkey); 246 PEM_write_bio_PrivateKey(out, pkey, cipher, 252 i2d_PUBKEY_bio(out, pkey); 254 i2d_PrivateKey_bio(out, pkey); [all...] |
H A D | spkac.c | 95 EVP_PKEY *pkey = NULL; local 196 pkey = load_key(bio_err, 199 if(!pkey) { 205 NETSCAPE_SPKI_set_pubkey(spki, pkey); 206 NETSCAPE_SPKI_sign(spki, pkey, EVP_md5()); 285 pkey = NETSCAPE_SPKI_get_pubkey(spki); 287 i = NETSCAPE_SPKI_verify(spki, pkey); 295 if(pubkey) PEM_write_bio_PUBKEY(out, pkey); 304 EVP_PKEY_free(pkey);
|
/external/openssl/crypto/evp/ |
H A D | p_verify.c | 66 unsigned int siglen, EVP_PKEY *pkey) 84 pkctx = EVP_PKEY_CTX_new(pkey, NULL); 101 if (pkey->type == v) 119 sigbuf,siglen,pkey->pkey.ptr)); 65 EVP_VerifyFinal(EVP_MD_CTX *ctx, const unsigned char *sigbuf, unsigned int siglen, EVP_PKEY *pkey) argument
|
H A D | p_sign.c | 79 EVP_PKEY *pkey) 97 size_t sltmp = (size_t)EVP_PKEY_size(pkey); 99 pkctx = EVP_PKEY_CTX_new(pkey, NULL); 119 if (pkey->type == v) 137 pkey->pkey.ptr)); 78 EVP_SignFinal(EVP_MD_CTX *ctx, unsigned char *sigret, unsigned int *siglen, EVP_PKEY *pkey) argument
|
H A D | evp_pkey.c | 70 EVP_PKEY *pkey = NULL; local 77 if (!(pkey = EVP_PKEY_new())) { 82 if (!EVP_PKEY_set_type(pkey, OBJ_obj2nid(algoid))) 90 if (pkey->ameth->priv_decode) 92 if (!pkey->ameth->priv_decode(pkey, p8)) 105 return pkey; 108 EVP_PKEY_free (pkey); 112 PKCS8_PRIV_KEY_INFO *EVP_PKEY2PKCS8(EVP_PKEY *pkey) argument 114 return EVP_PKEY2PKCS8_broken(pkey, PKCS8_O 119 EVP_PKEY2PKCS8_broken(EVP_PKEY *pkey, int broken) argument [all...] |
H A D | m_sigver.c | 67 const EVP_MD *type, ENGINE *e, EVP_PKEY *pkey, 71 ctx->pctx = EVP_PKEY_CTX_new(pkey, e); 78 if (EVP_PKEY_get_default_digest_nid(pkey, &def_nid) > 0) 120 const EVP_MD *type, ENGINE *e, EVP_PKEY *pkey) 122 return do_sigver_init(ctx, pctx, type, e, pkey, 0); 126 const EVP_MD *type, ENGINE *e, EVP_PKEY *pkey) 128 return do_sigver_init(ctx, pctx, type, e, pkey, 1); 66 do_sigver_init(EVP_MD_CTX *ctx, EVP_PKEY_CTX **pctx, const EVP_MD *type, ENGINE *e, EVP_PKEY *pkey, int ver) argument 119 EVP_DigestSignInit(EVP_MD_CTX *ctx, EVP_PKEY_CTX **pctx, const EVP_MD *type, ENGINE *e, EVP_PKEY *pkey) argument 125 EVP_DigestVerifyInit(EVP_MD_CTX *ctx, EVP_PKEY_CTX **pctx, const EVP_MD *type, ENGINE *e, EVP_PKEY *pkey) argument
|
/external/openssl/crypto/hmac/ |
H A D | hm_ameth.c | 70 static int hmac_size(const EVP_PKEY *pkey) argument 75 static void hmac_key_free(EVP_PKEY *pkey) argument 77 ASN1_OCTET_STRING *os = (ASN1_OCTET_STRING *)pkey->pkey.ptr; 87 static int hmac_pkey_ctrl(EVP_PKEY *pkey, int op, long arg1, void *arg2) argument 106 static int old_hmac_decode(EVP_PKEY *pkey, argument 113 EVP_PKEY_assign(pkey, EVP_PKEY_HMAC, os); 117 static int old_hmac_encode(const EVP_PKEY *pkey, unsigned char **pder) argument 120 ASN1_OCTET_STRING *os = (ASN1_OCTET_STRING *)pkey->pkey [all...] |
/external/openssl/crypto/pem/ |
H A D | pem_sign.c | 79 EVP_PKEY *pkey) 85 m=(unsigned char *)OPENSSL_malloc(EVP_PKEY_size(pkey)+2); 92 if (EVP_SignFinal(ctx,m,&m_len,pkey) <= 0) goto err; 78 PEM_SignFinal(EVP_MD_CTX *ctx, unsigned char *sigret, unsigned int *siglen, EVP_PKEY *pkey) argument
|
/external/openssl/crypto/pkcs7/ |
H A D | sign.c | 70 EVP_PKEY *pkey; local 111 if ((pkey=PEM_read_bio_PrivateKey(in,NULL,NULL,NULL)) == NULL) goto err; 117 si=PKCS7_add_signature(p7,x509,pkey,EVP_sha1());
|
/external/chromium/third_party/libjingle/source/talk/base/ |
H A D | opensslidentity.h | 57 EVP_PKEY* pkey() const { return pkey_; } function in class:talk_base::OpenSSLKeyPair 60 explicit OpenSSLKeyPair(EVP_PKEY* pkey) : pkey_(pkey) { argument
|
/external/openssl/crypto/engine/ |
H A D | eng_pkey.c | 99 EVP_PKEY *pkey; local 122 pkey = e->load_privkey(e, key_id, ui_method, callback_data); 123 if (!pkey) 129 return pkey; 135 EVP_PKEY *pkey; local 158 pkey = e->load_pubkey(e, key_id, ui_method, callback_data); 159 if (!pkey) 165 return pkey;
|
/external/openssl/crypto/pkcs12/ |
H A D | p12_crt.c | 66 static int copy_bag_attr(PKCS12_SAFEBAG *bag, EVP_PKEY *pkey, int nid) argument 70 idx = EVP_PKEY_get_attr_by_NID(pkey, nid, -1); 73 attr = EVP_PKEY_get_attr(pkey, idx); 79 PKCS12 *PKCS12_create(char *pass, char *name, EVP_PKEY *pkey, X509 *cert, argument 101 if(!pkey && !cert && !ca) 107 if (pkey && cert) 109 if(!X509_check_private_key(cert, pkey)) 136 if (pkey) 138 bag = PKCS12_add_key(&bags, pkey, keytype, iter, nid_key, pass); 143 if (!copy_bag_attr(bag, pkey, NID_ms_csp_nam [all...] |