/external/chromium_org/content/child/webcrypto/openssl/ |
H A D | rsa_oaep_openssl.cc | 46 EVP_PKEY* pkey = AsymKeyOpenSsl::Cast(key)->key(); local 52 crypto::ScopedEVP_PKEY_CTX ctx(EVP_PKEY_CTX_new(pkey, NULL));
|
/external/chromium_org/net/cert/ |
H A D | jwk_serializer_openssl.cc | 26 bool ConvertEcKeyToJwk(EVP_PKEY* pkey, argument 29 crypto::ScopedEC_KEY ec_key(EVP_PKEY_get1_EC_KEY(pkey));
|
/external/chromium_org/third_party/boringssl/src/crypto/obj/ |
H A D | obj_xref.c | 106 nid_triple key, *pkey; local 111 pkey = &key; 113 triple = bsearch(&pkey, sigoid_srt_xref,
|
/external/chromium_org/third_party/boringssl/src/crypto/x509/ |
H A D | a_sign.c | 73 ASN1_BIT_STRING *signature, char *data, EVP_PKEY *pkey, 118 outll=outl=EVP_PKEY_size(pkey); 132 (unsigned int *)&outl,pkey)) 160 ASN1_BIT_STRING *signature, void *asn, EVP_PKEY *pkey, 165 if (!EVP_DigestSignInit(&ctx, NULL, type, NULL, pkey)) 179 EVP_PKEY *pkey; local 186 pkey = EVP_PKEY_CTX_get0_pkey(ctx->pctx); 188 if (!type || !pkey) 194 if (pkey->ameth->item_sign) 196 rv = pkey 159 ASN1_item_sign(const ASN1_ITEM *it, X509_ALGOR *algor1, X509_ALGOR *algor2, ASN1_BIT_STRING *signature, void *asn, EVP_PKEY *pkey, const EVP_MD *type) argument [all...] |
/external/chromium_org/third_party/webrtc/base/ |
H A D | opensslidentity.h | 31 explicit OpenSSLKeyPair(EVP_PKEY* pkey) : pkey_(pkey) { argument 44 EVP_PKEY* pkey() const { return pkey_; } function in class:rtc::OpenSSLKeyPair
|
/external/google-tv-pairing-protocol/cpp/src/polo/util/ |
H A D | certificateutil.cc | 57 EVP_PKEY* pkey = PEM_read_bio_PrivateKey(bio, NULL, 0, &passphrase[0]); local 60 return pkey; 63 std::string CertificateUtil::PKEYToPEM(EVP_PKEY* pkey, argument 66 PEM_write_bio_PrivateKey(bio, pkey, EVP_des_ede3_cbc(), NULL, 0, 0, 80 EVP_PKEY* pkey = EVP_PKEY_new(); local 82 EVP_PKEY_assign_RSA(pkey, rsa); 83 return pkey; 86 X509* CertificateUtil::GenerateSelfSignedCert(EVP_PKEY* pkey, argument 94 X509_set_pubkey(x509, pkey); 101 X509_sign(x509, pkey, EVP_sha25 [all...] |
/external/openssl/crypto/asn1/ |
H A D | a_verify.c | 78 char *data, EVP_PKEY *pkey) 116 (unsigned int)signature->length,pkey) <= 0) 135 ASN1_BIT_STRING *signature, void *asn, EVP_PKEY *pkey) 143 if (!pkey) 159 if (!pkey->ameth || !pkey->ameth->item_verify) 164 ret = pkey->ameth->item_verify(&ctx, it, asn, a, 165 signature, pkey); 185 if (EVP_PKEY_type(pknid) != pkey->ameth->pkey_id) 191 if (!EVP_DigestVerifyInit(&ctx, NULL, type, NULL, pkey)) 77 ASN1_verify(i2d_of_void *i2d, X509_ALGOR *a, ASN1_BIT_STRING *signature, char *data, EVP_PKEY *pkey) argument 134 ASN1_item_verify(const ASN1_ITEM *it, X509_ALGOR *a, ASN1_BIT_STRING *signature, void *asn, EVP_PKEY *pkey) argument [all...] |
H A D | a_sign.c | 131 ASN1_BIT_STRING *signature, char *data, EVP_PKEY *pkey, 176 outll=outl=EVP_PKEY_size(pkey); 190 (unsigned int *)&outl,pkey)) 217 ASN1_BIT_STRING *signature, void *asn, EVP_PKEY *pkey, 222 if (!EVP_DigestSignInit(&ctx, NULL, type, NULL, pkey)) 236 EVP_PKEY *pkey; local 243 pkey = EVP_PKEY_CTX_get0_pkey(ctx->pctx); 245 if (!type || !pkey) 251 if (pkey->ameth->item_sign) 253 rv = pkey 130 ASN1_sign(i2d_of_void *i2d, X509_ALGOR *algor1, X509_ALGOR *algor2, ASN1_BIT_STRING *signature, char *data, EVP_PKEY *pkey, const EVP_MD *type) argument 216 ASN1_item_sign(const ASN1_ITEM *it, X509_ALGOR *algor1, X509_ALGOR *algor2, ASN1_BIT_STRING *signature, void *asn, EVP_PKEY *pkey, const EVP_MD *type) argument [all...] |
H A D | t_req.c | 97 EVP_PKEY *pkey; local 145 pkey=X509_REQ_get_pubkey(x); 146 if (pkey == NULL) 153 EVP_PKEY_print_public(bp, pkey, 16, NULL); 154 EVP_PKEY_free(pkey);
|
/external/openssl/crypto/evp/ |
H A D | p_sign.c | 79 EVP_PKEY *pkey) 97 size_t sltmp = (size_t)EVP_PKEY_size(pkey); 99 pkctx = EVP_PKEY_CTX_new(pkey, NULL); 119 if (pkey->type == v) 137 pkey->pkey.ptr)); 78 EVP_SignFinal(EVP_MD_CTX *ctx, unsigned char *sigret, unsigned int *siglen, EVP_PKEY *pkey) argument
|
H A D | evp_pkey.c | 70 EVP_PKEY *pkey = NULL; local 77 if (!(pkey = EVP_PKEY_new())) { 82 if (!EVP_PKEY_set_type(pkey, OBJ_obj2nid(algoid))) 90 if (pkey->ameth->priv_decode) 92 if (!pkey->ameth->priv_decode(pkey, p8)) 105 return pkey; 108 EVP_PKEY_free (pkey); 112 PKCS8_PRIV_KEY_INFO *EVP_PKEY2PKCS8(EVP_PKEY *pkey) argument 114 return EVP_PKEY2PKCS8_broken(pkey, PKCS8_O 119 EVP_PKEY2PKCS8_broken(EVP_PKEY *pkey, int broken) argument [all...] |
H A D | m_sigver.c | 67 const EVP_MD *type, ENGINE *e, EVP_PKEY *pkey, 71 ctx->pctx = EVP_PKEY_CTX_new(pkey, e); 78 if (EVP_PKEY_get_default_digest_nid(pkey, &def_nid) > 0) 120 const EVP_MD *type, ENGINE *e, EVP_PKEY *pkey) 122 return do_sigver_init(ctx, pctx, type, e, pkey, 0); 126 const EVP_MD *type, ENGINE *e, EVP_PKEY *pkey) 128 return do_sigver_init(ctx, pctx, type, e, pkey, 1); 66 do_sigver_init(EVP_MD_CTX *ctx, EVP_PKEY_CTX **pctx, const EVP_MD *type, ENGINE *e, EVP_PKEY *pkey, int ver) argument 119 EVP_DigestSignInit(EVP_MD_CTX *ctx, EVP_PKEY_CTX **pctx, const EVP_MD *type, ENGINE *e, EVP_PKEY *pkey) argument 125 EVP_DigestVerifyInit(EVP_MD_CTX *ctx, EVP_PKEY_CTX **pctx, const EVP_MD *type, ENGINE *e, EVP_PKEY *pkey) argument
|
/external/chromium_org/net/android/ |
H A D | keystore.cc | 137 long pkey = Java_AndroidKeyStore_getOpenSSLHandleForPrivateKey( local 141 return reinterpret_cast<AndroidEVP_PKEY*>(pkey);
|
H A D | legacy_openssl.h | 90 } pkey; member in struct:net::android::AndroidEVP_PKEY
|
/external/chromium_org/net/ssl/ |
H A D | openssl_client_key_store.cc | 24 EVP_PKEY* pkey = local 26 if (!pkey) 28 return crypto::ScopedEVP_PKEY(pkey);
|
/external/chromium_org/third_party/boringssl/src/crypto/evp/ |
H A D | digestsign.c | 80 const EVP_MD *type, ENGINE *e, EVP_PKEY *pkey, 83 ctx->pctx = EVP_PKEY_CTX_new(pkey, e); 131 ENGINE *e, EVP_PKEY *pkey) { 132 return do_sigver_init(ctx, pctx, type, e, pkey, 0); 136 const EVP_MD *type, ENGINE *e, EVP_PKEY *pkey) { 137 return do_sigver_init(ctx, pctx, type, e, pkey, 1); 79 do_sigver_init(EVP_MD_CTX *ctx, EVP_PKEY_CTX **pctx, const EVP_MD *type, ENGINE *e, EVP_PKEY *pkey, int is_verify) argument 130 EVP_DigestSignInit(EVP_MD_CTX *ctx, EVP_PKEY_CTX **pctx, const EVP_MD *type, ENGINE *e, EVP_PKEY *pkey) argument 135 EVP_DigestVerifyInit(EVP_MD_CTX *ctx, EVP_PKEY_CTX **pctx, const EVP_MD *type, ENGINE *e, EVP_PKEY *pkey) argument
|
H A D | sign.c | 78 unsigned int *out_sig_len, EVP_PKEY *pkey) { 84 size_t sig_len = EVP_PKEY_size(pkey); 100 pkctx = EVP_PKEY_CTX_new(pkey, NULL); 130 EVP_PKEY *pkey) { 150 pkctx = EVP_PKEY_CTX_new(pkey, NULL); 77 EVP_SignFinal(const EVP_MD_CTX *ctx, uint8_t *sig, unsigned int *out_sig_len, EVP_PKEY *pkey) argument 129 EVP_VerifyFinal(EVP_MD_CTX *ctx, const uint8_t *sig, size_t sig_len, EVP_PKEY *pkey) argument
|
H A D | p_hmac.c | 123 static int pkey_hmac_keygen(EVP_PKEY_CTX *ctx, EVP_PKEY *pkey) { argument 134 EVP_PKEY_assign(pkey, EVP_PKEY_HMAC, hkey); 193 key = (ASN1_OCTET_STRING *)ctx->pkey->pkey.ptr;
|
/external/openssl/apps/ |
H A D | pkey.c | 1 /* apps/pkey.c */ 78 EVP_PKEY *pkey=NULL; local 186 BIO_printf(bio_err, "Usage pkey [options]\n"); 231 pkey = load_pubkey(bio_err, infile, informat, 1, 234 pkey = load_key(bio_err, infile, informat, 1, 236 if (!pkey) 244 PEM_write_bio_PUBKEY(out,pkey); 246 PEM_write_bio_PrivateKey(out, pkey, cipher, 252 i2d_PUBKEY_bio(out, pkey); 254 i2d_PrivateKey_bio(out, pkey); [all...] |
H A D | spkac.c | 95 EVP_PKEY *pkey = NULL; local 196 pkey = load_key(bio_err, 199 if(!pkey) { 205 NETSCAPE_SPKI_set_pubkey(spki, pkey); 206 NETSCAPE_SPKI_sign(spki, pkey, EVP_md5()); 285 pkey = NETSCAPE_SPKI_get_pubkey(spki); 287 i = NETSCAPE_SPKI_verify(spki, pkey); 295 if(pubkey) PEM_write_bio_PUBKEY(out, pkey); 304 EVP_PKEY_free(pkey);
|
/external/openssl/crypto/engine/ |
H A D | eng_pkey.c | 99 EVP_PKEY *pkey; local 122 pkey = e->load_privkey(e, key_id, ui_method, callback_data); 123 if (!pkey) 129 return pkey; 135 EVP_PKEY *pkey; local 158 pkey = e->load_pubkey(e, key_id, ui_method, callback_data); 159 if (!pkey) 165 return pkey;
|
/external/openssl/crypto/pkcs12/ |
H A D | p12_crt.c | 66 static int copy_bag_attr(PKCS12_SAFEBAG *bag, EVP_PKEY *pkey, int nid) argument 70 idx = EVP_PKEY_get_attr_by_NID(pkey, nid, -1); 73 attr = EVP_PKEY_get_attr(pkey, idx); 79 PKCS12 *PKCS12_create(char *pass, char *name, EVP_PKEY *pkey, X509 *cert, argument 112 if(!pkey && !cert && !ca) 118 if (pkey && cert) 120 if(!X509_check_private_key(cert, pkey)) 147 if (pkey) 149 bag = PKCS12_add_key(&bags, pkey, keytype, iter, nid_key, pass); 154 if (!copy_bag_attr(bag, pkey, NID_ms_csp_nam [all...] |
H A D | p12_kiss.c | 66 EVP_PKEY **pkey, STACK_OF(X509) *ocerts); 69 int passlen, EVP_PKEY **pkey, STACK_OF(X509) *ocerts); 72 EVP_PKEY **pkey, STACK_OF(X509) *ocerts); 76 * or it should point to a valid STACK structure. pkey and cert can be 80 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, argument 93 if(pkey) 94 *pkey = NULL; 127 if (!parse_pk12 (p12, pass, -1, pkey, ocerts)) 135 if (pkey && *pkey 179 parse_pk12(PKCS12 *p12, const char *pass, int passlen, EVP_PKEY **pkey, STACK_OF(X509) *ocerts) argument 224 parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen, EVP_PKEY **pkey, STACK_OF(X509) *ocerts) argument [all...] |
/external/srec/srec/Semproc/src/ |
H A D | SymbolTable.c | 125 LCHAR *pkey; local 134 HashMapGetKeyAtIndex(self->hashmap, i, &pkey); 135 HashMapGet(self->hashmap, pkey, (void **)&pvalue); 144 HashMapPut(dst, pkey, copyValue);
|
/external/chromium_org/net/socket/ |
H A D | ssl_client_socket_openssl_unittest.cc | 57 // |*pkey| is reset to the new EVP_PKEY on success, untouched otherwise. 61 crypto::ScopedEVP_PKEY* pkey) { 81 pkey->reset(result); 59 LoadPrivateKeyOpenSSL( const base::FilePath& filepath, crypto::ScopedEVP_PKEY* pkey) argument
|