/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | crypto_openssl.c | 120 u8 pkey[8], next, tmp; local 128 pkey[i] = (tmp >> i) | next | 1; 131 pkey[i] = next | 1; 133 DES_set_key((DES_cblock *) &pkey, &ks);
|
/external/wpa_supplicant_8/wpa_supplicant/src/pae/ |
H A D | ieee802_1x_kay_i.h | 114 struct data_key *pkey; member in struct:transmit_sa 143 struct data_key *pkey; member in struct:receive_sa
|
H A D | ieee802_1x_kay.c | 427 psa->pkey = key; 450 psa->pkey = NULL; 1117 if (is_ki_equal(&rxsa->pkey->key_identifier, ki)) { 1358 if (sa_key != NULL && txsa->pkey == sa_key) { 1473 struct data_key *pkey; local 1478 pkey = os_zalloc(sizeof(*pkey)); 1479 if (pkey == NULL) { 1484 pkey->key = os_zalloc(conf->key_len); 1485 if (pkey 1921 ieee802_1x_kay_deinit_data_key(struct data_key *pkey) argument [all...] |
/external/chromium_org/third_party/boringssl/src/crypto/x509/ |
H A D | x509_vfy.c | 1715 EVP_PKEY *pkey=NULL; local 1760 if ((pkey=X509_get_pubkey(xi)) == NULL) 1767 else if (X509_verify(xs,pkey) <= 0) 1774 EVP_PKEY_free(pkey); 1778 EVP_PKEY_free(pkey); 1779 pkey=NULL; 1920 int X509_get_pubkey_parameters(EVP_PKEY *pkey, STACK_OF(X509) *chain) argument 1925 if ((pkey != NULL) && !EVP_PKEY_missing_parameters(pkey)) return 1; 1957 if (pkey ! [all...] |
/external/chromium_org/third_party/boringssl/src/include/openssl/ |
H A D | x509_vfy.h | 126 EVP_PKEY *pkey; member in union:x509_object_st::__anon11676
|
/external/chromium_org/third_party/boringssl/src/ssl/ |
H A D | t1_lib.c | 654 EVP_PKEY *pkey; local 656 pkey = X509_get_pubkey(x); 657 if (!pkey) 660 if (pkey->type != EVP_PKEY_EC) 662 EVP_PKEY_free(pkey); 665 rv = tls1_curve_params_from_ec_key(&curve_id, &comp_id, pkey->pkey.ec); 666 EVP_PKEY_free(pkey); 754 SSL *s, CBS *cbs, EVP_PKEY *pkey) 758 int sigalg = tls12_get_sigid(pkey); 753 tls12_check_peer_sigalg(const EVP_MD **out_md, int *out_alert, SSL *s, CBS *cbs, EVP_PKEY *pkey) argument [all...] |
/external/ipsec-tools/src/racoon/ |
H A D | crypto_openssl.c | 969 res = eay_rsa_verify(source, sig, evp->pkey.rsa); 1000 vchar_t *pkey = NULL; local 1033 pkey = vmalloc(pkeylen); 1034 if (pkey == NULL) 1036 bp = (unsigned char *) pkey->v; 1046 if (error != 0 && pkey != NULL) { 1047 vfree(pkey); 1048 pkey = NULL; 1051 return pkey; 1063 vchar_t *pkey local [all...] |
/external/openssl/apps/ |
H A D | ca.c | 199 static int certify(X509 **xret, char *infile,EVP_PKEY *pkey,X509 *x509, 206 static int certify_cert(X509 **xret, char *infile,EVP_PKEY *pkey,X509 *x509, 214 static int certify_spkac(X509 **xret, char *infile,EVP_PKEY *pkey,X509 *x509, 222 static int do_body(X509 **xret, EVP_PKEY *pkey, X509 *x509, const EVP_MD *dgst, 276 EVP_PKEY *pkey=NULL; local 761 pkey = load_key(bio_err, keyfile, keyform, 0, key, e, 764 if (pkey == NULL) 786 if (!X509_check_private_key(x509,pkey)) 1048 if (EVP_PKEY_get_default_digest_nid(pkey, &def_nid) <= 0) 1187 j=certify_spkac(&x,spkac_file,pkey,x50 1574 certify(X509 **xret, char *infile, EVP_PKEY *pkey, X509 *x509, const EVP_MD *dgst, STACK_OF(OPENSSL_STRING) *sigopts, STACK_OF(CONF_VALUE) *policy, CA_DB *db, BIGNUM *serial, char *subj,unsigned long chtype, int multirdn, int email_dn, char *startdate, char *enddate, long days, int batch, char *ext_sect, CONF *lconf, int verbose, unsigned long certopt, unsigned long nameopt, int default_op, int ext_copy, int selfsign) argument 1647 certify_cert(X509 **xret, char *infile, EVP_PKEY *pkey, X509 *x509, const EVP_MD *dgst, STACK_OF(OPENSSL_STRING) *sigopts, STACK_OF(CONF_VALUE) *policy, CA_DB *db, BIGNUM *serial, char *subj, unsigned long chtype, int multirdn, int email_dn, char *startdate, char *enddate, long days, int batch, char *ext_sect, CONF *lconf, int verbose, unsigned long certopt, unsigned long nameopt, int default_op, int ext_copy, ENGINE *e) argument 1702 do_body(X509 **xret, EVP_PKEY *pkey, X509 *x509, const EVP_MD *dgst, STACK_OF(OPENSSL_STRING) *sigopts, STACK_OF(CONF_VALUE) *policy, CA_DB *db, BIGNUM *serial, char *subj, unsigned long chtype, int multirdn, int email_dn, char *startdate, char *enddate, long days, int batch, int verbose, X509_REQ *req, char *ext_sect, CONF *lconf, unsigned long certopt, unsigned long nameopt, int default_op, int ext_copy, int selfsign) argument 2268 certify_spkac(X509 **xret, char *infile, EVP_PKEY *pkey, X509 *x509, const EVP_MD *dgst, STACK_OF(OPENSSL_STRING) *sigopts, STACK_OF(CONF_VALUE) *policy, CA_DB *db, BIGNUM *serial, char *subj,unsigned long chtype, int multirdn, int email_dn, char *startdate, char *enddate, long days, char *ext_sect, CONF *lconf, int verbose, unsigned long certopt, unsigned long nameopt, int default_op, int ext_copy) argument [all...] |
H A D | apps.c | 745 EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca) 781 ret = PKCS12_parse(p12, pass, pkey, cert, ca); 868 EVP_PKEY *pkey=NULL; local 886 pkey = ENGINE_load_private_key(e, file, 888 if (!pkey) 922 pkey=d2i_PrivateKey_bio(key, NULL); 926 pkey=PEM_read_bio_PrivateKey(key,NULL, 931 pkey = load_netscape_key(err, key, file, key_descrip, format); 937 &pkey, NULL, NULL)) 942 pkey 743 load_pkcs12(BIO *err, BIO *in, const char *desc, pem_password_cb *pem_cb, void *cb_data, EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca) argument 966 EVP_PKEY *pkey=NULL; local 1076 EVP_PKEY *pkey; local [all...] |
/external/openssl/crypto/pkcs7/ |
H A D | pkcs7.h | 103 EVP_PKEY *pkey; member in struct:pkcs7_signer_info_st 310 int PKCS7_SIGNER_INFO_set(PKCS7_SIGNER_INFO *p7i, X509 *x509, EVP_PKEY *pkey, 324 BIO *PKCS7_dataDecode(PKCS7 *p7, EVP_PKEY *pkey, BIO *in_bio, X509 *pcert); 328 EVP_PKEY *pkey, const EVP_MD *dgst); 355 PKCS7 *PKCS7_sign(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs, 359 X509 *signcert, EVP_PKEY *pkey, const EVP_MD *md, 368 int PKCS7_decrypt(PKCS7 *p7, EVP_PKEY *pkey, X509 *cert, BIO *data, int flags);
|
/external/openssl/crypto/x509/ |
H A D | x509_vfy.c | 1590 EVP_PKEY *pkey=NULL; local 1630 if ((pkey=X509_get_pubkey(xi)) == NULL) 1637 else if (X509_verify(xs,pkey) <= 0) 1644 EVP_PKEY_free(pkey); 1648 EVP_PKEY_free(pkey); 1649 pkey=NULL; 1789 int X509_get_pubkey_parameters(EVP_PKEY *pkey, STACK_OF(X509) *chain) argument 1794 if ((pkey != NULL) && !EVP_PKEY_missing_parameters(pkey)) return 1; 1826 if (pkey ! [all...] |
H A D | x509_vfy.h | 131 EVP_PKEY *pkey; member in union:x509_object_st::__anon28369
|
H A D | x509.h | 164 EVP_PKEY *pkey; member in struct:X509_pubkey_st 592 ASN1_TYPE *pkey; /* Should be OCTET STRING but some are broken */ member in struct:pkcs8_priv_key_info_st 656 int NETSCAPE_SPKI_set_pubkey(NETSCAPE_SPKI *x, EVP_PKEY *pkey); 663 int X509_sign(X509 *x, EVP_PKEY *pkey, const EVP_MD *md); 665 int X509_REQ_sign(X509_REQ *x, EVP_PKEY *pkey, const EVP_MD *md); 667 int X509_CRL_sign(X509_CRL *x, EVP_PKEY *pkey, const EVP_MD *md); 669 int NETSCAPE_SPKI_sign(NETSCAPE_SPKI *x, EVP_PKEY *pkey, const EVP_MD *md); 716 int i2d_PrivateKey_fp(FILE *fp, EVP_PKEY *pkey); 718 int i2d_PUBKEY_fp(FILE *fp, EVP_PKEY *pkey); 755 int i2d_PrivateKey_bio(BIO *bp, EVP_PKEY *pkey); [all...] |
/external/openssl/include/openssl/ |
H A D | pkcs7.h | 103 EVP_PKEY *pkey; member in struct:pkcs7_signer_info_st 310 int PKCS7_SIGNER_INFO_set(PKCS7_SIGNER_INFO *p7i, X509 *x509, EVP_PKEY *pkey, 324 BIO *PKCS7_dataDecode(PKCS7 *p7, EVP_PKEY *pkey, BIO *in_bio, X509 *pcert); 328 EVP_PKEY *pkey, const EVP_MD *dgst); 355 PKCS7 *PKCS7_sign(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs, 359 X509 *signcert, EVP_PKEY *pkey, const EVP_MD *md, 368 int PKCS7_decrypt(PKCS7 *p7, EVP_PKEY *pkey, X509 *cert, BIO *data, int flags);
|
H A D | x509_vfy.h | 131 EVP_PKEY *pkey; member in union:x509_object_st::__anon28402
|
H A D | x509.h | 164 EVP_PKEY *pkey; member in struct:X509_pubkey_st 592 ASN1_TYPE *pkey; /* Should be OCTET STRING but some are broken */ member in struct:pkcs8_priv_key_info_st 656 int NETSCAPE_SPKI_set_pubkey(NETSCAPE_SPKI *x, EVP_PKEY *pkey); 663 int X509_sign(X509 *x, EVP_PKEY *pkey, const EVP_MD *md); 665 int X509_REQ_sign(X509_REQ *x, EVP_PKEY *pkey, const EVP_MD *md); 667 int X509_CRL_sign(X509_CRL *x, EVP_PKEY *pkey, const EVP_MD *md); 669 int NETSCAPE_SPKI_sign(NETSCAPE_SPKI *x, EVP_PKEY *pkey, const EVP_MD *md); 716 int i2d_PrivateKey_fp(FILE *fp, EVP_PKEY *pkey); 718 int i2d_PUBKEY_fp(FILE *fp, EVP_PKEY *pkey); 755 int i2d_PrivateKey_bio(BIO *bp, EVP_PKEY *pkey); [all...] |
/external/openssl/ssl/ |
H A D | s3_srvr.c | 1631 EVP_PKEY *pkey; local 1914 if ((pkey=ssl_get_sign_pkey(s,s->s3->tmp.new_cipher,&md)) 1920 kn=EVP_PKEY_size(pkey); 1924 pkey=NULL; 1994 if (pkey != NULL) 1999 if (pkey->type == EVP_PKEY_RSA 2019 &(p[2]), &u, pkey->pkey.rsa) <= 0) 2035 if (!tls12_get_sigandhash(p, pkey, md)) 2053 (unsigned int *)&i,pkey)) 2206 EVP_PKEY *pkey=NULL; local 3011 EVP_PKEY *pkey=NULL; local [all...] |
H A D | ssltest.c | 389 EVP_PKEY *pkey = X509_get_pubkey(cert); local 390 if (pkey != NULL) 395 else if (pkey->type == EVP_PKEY_RSA && pkey->pkey.rsa != NULL 396 && pkey->pkey.rsa->n != NULL) 399 BN_num_bits(pkey->pkey.rsa->n)); 403 else if (pkey [all...] |
H A D | ssl_lib.c | 2401 EVP_PKEY *pkey = NULL; local 2412 pkey = X509_get_pubkey(x); 2413 if (pkey == NULL) return 0; 2414 keysize = EVP_PKEY_bits(pkey); 2415 EVP_PKEY_free(pkey);
|
/external/srec/srec/Recognizer/src/ |
H A D | RecognizerImpl.c | 1959 LCHAR* pkey; local 2167 CHKLOG(rc, impl->grammars->getKeyAtIndex(impl->grammars, grammarIndex_for_iBest, &pkey)); 2168 CHKLOG(rc, impl->grammars->get(impl->grammars, pkey, (void **)&pgrammar));
|
/external/wpa_supplicant_8/hostapd/src/pae/ |
H A D | ieee802_1x_kay.c | 427 psa->pkey = key; 450 psa->pkey = NULL; 1117 if (is_ki_equal(&rxsa->pkey->key_identifier, ki)) { 1358 if (sa_key != NULL && txsa->pkey == sa_key) { 1473 struct data_key *pkey; local 1478 pkey = os_zalloc(sizeof(*pkey)); 1479 if (pkey == NULL) { 1484 pkey->key = os_zalloc(conf->key_len); 1485 if (pkey 1921 ieee802_1x_kay_deinit_data_key(struct data_key *pkey) argument [all...] |
/external/wpa_supplicant_8/src/pae/ |
H A D | ieee802_1x_kay.c | 427 psa->pkey = key; 450 psa->pkey = NULL; 1117 if (is_ki_equal(&rxsa->pkey->key_identifier, ki)) { 1358 if (sa_key != NULL && txsa->pkey == sa_key) { 1473 struct data_key *pkey; local 1478 pkey = os_zalloc(sizeof(*pkey)); 1479 if (pkey == NULL) { 1484 pkey->key = os_zalloc(conf->key_len); 1485 if (pkey 1921 ieee802_1x_kay_deinit_data_key(struct data_key *pkey) argument [all...] |
/external/linux-tools-perf/perf-3.12.0/tools/lib/traceevent/ |
H A D | event-parse.c | 3173 struct event_format *pkey = &key; local 3181 eventptr = bsearch(&pkey, pevent->events, pevent->nr_events,
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | tls_openssl.c | 450 pub_rsa = cert->cert_info->key->pkey->pkey.rsa; 1944 EVP_PKEY *pkey; local 1950 pkey = NULL; 1953 if (!PKCS12_parse(p12, passwd, &pkey, &cert, &certs)) { 1976 if (pkey) { 1979 if (SSL_use_PrivateKey(ssl, pkey) != 1) 1982 if (SSL_CTX_use_PrivateKey(ssl_ctx, pkey) != 1) 1985 EVP_PKEY_free(pkey);
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | tls_openssl.c | 450 pub_rsa = cert->cert_info->key->pkey->pkey.rsa; 1944 EVP_PKEY *pkey; local 1950 pkey = NULL; 1953 if (!PKCS12_parse(p12, passwd, &pkey, &cert, &certs)) { 1976 if (pkey) { 1979 if (SSL_use_PrivateKey(ssl, pkey) != 1) 1982 if (SSL_CTX_use_PrivateKey(ssl_ctx, pkey) != 1) 1985 EVP_PKEY_free(pkey);
|