Home
last modified time | relevance | path

Searched refs:pkey (Results 1 – 17 of 17) sorted by relevance

/openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/liboauth/liboauth/
H A D0001-Support-OpenSSL-1.1.0.patch37 EVP_PKEY *pkey;
48 len = EVP_PKEY_size(pkey);
53 - if (EVP_SignFinal (&md_ctx, sig, &len, pkey)) {
56 + if (EVP_SignFinal (md_ctx, sig, &len, pkey)) {
61 EVP_PKEY_free(pkey);
72 EVP_PKEY *pkey;
89 - err = EVP_VerifyFinal(&md_ctx, b64d, slen, pkey);
93 + err = EVP_VerifyFinal(md_ctx, b64d, slen, pkey);
95 EVP_PKEY_free(pkey);
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-devtools/android-tools/android-tools/core/
H A Dadb_libssl_11.diff38 pkey->n[i] = BN_get_word(rem);
40 - pkey->exponent = BN_get_word(rsa->e);
41 + pkey->exponent = BN_get_word(e);
/openbmc/google-misc/subprojects/libcr51sign/src/
H A Dlibcr51sign_support.c160 EVP_PKEY* pkey = NULL; in verify_signature() local
168 pkey = PEM_read_PUBKEY(fp, 0, 0, 0); in verify_signature()
169 if (!pkey) in verify_signature()
175 rsa = EVP_PKEY_get1_RSA(pkey); in verify_signature()
250 EVP_PKEY_free(pkey); in verify_signature()
/openbmc/u-boot/include/
H A Dfsl_validate.h102 u32 pkey; /* public key offset */ member
167 u8 pkey[2 * KEY_SIZE_BYTES]; member
180 u8 pkey[2 * KEY_SIZE_BYTES]; member
/openbmc/bmcweb/test/http/
H A Dmutual_tls.cpp61 EVP_PKEY* pkey = nullptr; in sign() local
67 ASSERT_EQ(EVP_PKEY_keygen(pctx, &pkey), 1); in sign()
71 ASSERT_EQ(X509_set_pubkey(ptr, pkey), 1); in sign()
72 ASSERT_GT(X509_sign(ptr, pkey, EVP_sha256()), 0); in sign()
73 EVP_PKEY_free(pkey); in sign()
/openbmc/bmcweb/src/
H A Dssl_key_handler.cpp159 EVP_PKEY* pkey = PEM_read_bio_PrivateKey(bufio, nullptr, nullptr, nullptr); in verifyOpensslKeyCert() local
161 if (pkey != nullptr) in verifyOpensslKeyCert()
164 EVP_PKEY_CTX_new_from_pkey(nullptr, pkey, nullptr); in verifyOpensslKeyCert()
198 EVP_PKEY_free(pkey); in verifyOpensslKeyCert()
/openbmc/u-boot/drivers/net/
H A Dne2000_base.c657 static int pkey = -1; variable
674 pkey = key; in uboot_push_tx_done()
759 pkey = -1; in ne2k_send()
765 if (pkey != -1) { in ne2k_send()
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-test/syzkaller/syzkaller/
H A D0001-executor-Include-missing-linux-falloc.h.patch27 @@ -5585,6 +5585,7 @@ static long syz_pkey_set(volatile long pkey, volatile long val)
/openbmc/openbmc/meta-phosphor/recipes-phosphor/flash/
H A Dphosphor-image-signing.bb28 openssl pkey -in "${signing_key}" -pubout -out ${UNPACKDIR}/publickey
/openbmc/phosphor-psu-code-mgmt/tools/
H A Dgenerate-psu-tar189 openssl pkey -in "${private_key_path}" -pubout -out "${public_key_path}"
/openbmc/openpower-pnor-code-mgmt/
H A Dgenerate-tar192 openssl pkey -in "${private_key_path}" -pubout -out "${public_key_path}"
/openbmc/phosphor-bmc-code-mgmt/bmc/
H A Dgen-bios-tar181 openssl pkey -in "${private_key_path}" -pubout -out "${public_key_path}"
/openbmc/openbmc/meta-openembedded/meta-oe/classes/
H A Dsigning.bbclass199 openssl pkey \
203 openssl pkey \
227 openssl pkey \
231 openssl pkey \
/openbmc/u-boot/board/freescale/common/
H A Dfsl_validate.c251 memcpy(&img->img_key, &(img->srk_tbl[key_num - 1].pkey), in read_validate_srk_tbl()
268 memcpy(&img->img_key, esbc + hdr->pkey, hdr->key_len); in read_validate_single_key()
317 memcpy(&img->img_key, &(ie_info->ie_key_tbl[ie_num - 1].pkey), in read_validate_ie_tbl()
/openbmc/openbmc-tools/openbmctool/
H A Dopenbmctool.py1028 for pkey in policyTable[policyKey]:
1029 if(type(policyTable[policyKey][pkey])== bool):
1030 event[pkey] = boolToString(policyTable[policyKey][pkey])
1032 if (i2creadFail and pkey == 'Message'):
1033 event[pkey] = policyTable[policyKey][pkey] + ' ' +i2cdevice
1035 event[pkey] = policyTable[policyKey][pkey]
/openbmc/
Dopengrok1.0.log[all...]
Dopengrok2.0.log[all...]