| /openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/liboauth/liboauth/ |
| H A D | 0001-Support-OpenSSL-1.1.0.patch | 37 EVP_PKEY *pkey; 48 len = EVP_PKEY_size(pkey); 53 - if (EVP_SignFinal (&md_ctx, sig, &len, pkey)) { 56 + if (EVP_SignFinal (md_ctx, sig, &len, pkey)) { 61 EVP_PKEY_free(pkey); 72 EVP_PKEY *pkey; 89 - err = EVP_VerifyFinal(&md_ctx, b64d, slen, pkey); 93 + err = EVP_VerifyFinal(md_ctx, b64d, slen, pkey); 95 EVP_PKEY_free(pkey);
|
| /openbmc/openbmc/meta-openembedded/meta-oe/recipes-devtools/android-tools/android-tools/core/ |
| H A D | adb_libssl_11.diff | 38 pkey->n[i] = BN_get_word(rem); 40 - pkey->exponent = BN_get_word(rsa->e); 41 + pkey->exponent = BN_get_word(e);
|
| /openbmc/google-misc/subprojects/libcr51sign/src/ |
| H A D | libcr51sign_support.c | 160 EVP_PKEY* pkey = NULL; in verify_signature() local 168 pkey = PEM_read_PUBKEY(fp, 0, 0, 0); in verify_signature() 169 if (!pkey) in verify_signature() 175 rsa = EVP_PKEY_get1_RSA(pkey); in verify_signature() 250 EVP_PKEY_free(pkey); in verify_signature()
|
| /openbmc/u-boot/include/ |
| H A D | fsl_validate.h | 102 u32 pkey; /* public key offset */ member 167 u8 pkey[2 * KEY_SIZE_BYTES]; member 180 u8 pkey[2 * KEY_SIZE_BYTES]; member
|
| /openbmc/bmcweb/test/http/ |
| H A D | mutual_tls.cpp | 61 EVP_PKEY* pkey = nullptr; in sign() local 67 ASSERT_EQ(EVP_PKEY_keygen(pctx, &pkey), 1); in sign() 71 ASSERT_EQ(X509_set_pubkey(ptr, pkey), 1); in sign() 72 ASSERT_GT(X509_sign(ptr, pkey, EVP_sha256()), 0); in sign() 73 EVP_PKEY_free(pkey); in sign()
|
| /openbmc/bmcweb/src/ |
| H A D | ssl_key_handler.cpp | 159 EVP_PKEY* pkey = PEM_read_bio_PrivateKey(bufio, nullptr, nullptr, nullptr); in verifyOpensslKeyCert() local 161 if (pkey != nullptr) in verifyOpensslKeyCert() 164 EVP_PKEY_CTX_new_from_pkey(nullptr, pkey, nullptr); in verifyOpensslKeyCert() 198 EVP_PKEY_free(pkey); in verifyOpensslKeyCert()
|
| /openbmc/u-boot/drivers/net/ |
| H A D | ne2000_base.c | 657 static int pkey = -1; variable 674 pkey = key; in uboot_push_tx_done() 759 pkey = -1; in ne2k_send() 765 if (pkey != -1) { in ne2k_send()
|
| /openbmc/openbmc/meta-openembedded/meta-oe/recipes-test/syzkaller/syzkaller/ |
| H A D | 0001-executor-Include-missing-linux-falloc.h.patch | 27 @@ -5585,6 +5585,7 @@ static long syz_pkey_set(volatile long pkey, volatile long val)
|
| /openbmc/openbmc/meta-phosphor/recipes-phosphor/flash/ |
| H A D | phosphor-image-signing.bb | 28 openssl pkey -in "${signing_key}" -pubout -out ${UNPACKDIR}/publickey
|
| /openbmc/phosphor-psu-code-mgmt/tools/ |
| H A D | generate-psu-tar | 189 openssl pkey -in "${private_key_path}" -pubout -out "${public_key_path}"
|
| /openbmc/openpower-pnor-code-mgmt/ |
| H A D | generate-tar | 192 openssl pkey -in "${private_key_path}" -pubout -out "${public_key_path}"
|
| /openbmc/phosphor-bmc-code-mgmt/bmc/ |
| H A D | gen-bios-tar | 181 openssl pkey -in "${private_key_path}" -pubout -out "${public_key_path}"
|
| /openbmc/openbmc/meta-openembedded/meta-oe/classes/ |
| H A D | signing.bbclass | 199 openssl pkey \ 203 openssl pkey \ 227 openssl pkey \ 231 openssl pkey \
|
| /openbmc/u-boot/board/freescale/common/ |
| H A D | fsl_validate.c | 251 memcpy(&img->img_key, &(img->srk_tbl[key_num - 1].pkey), in read_validate_srk_tbl() 268 memcpy(&img->img_key, esbc + hdr->pkey, hdr->key_len); in read_validate_single_key() 317 memcpy(&img->img_key, &(ie_info->ie_key_tbl[ie_num - 1].pkey), in read_validate_ie_tbl()
|
| /openbmc/openbmc-tools/openbmctool/ |
| H A D | openbmctool.py | 1028 for pkey in policyTable[policyKey]: 1029 if(type(policyTable[policyKey][pkey])== bool): 1030 event[pkey] = boolToString(policyTable[policyKey][pkey]) 1032 if (i2creadFail and pkey == 'Message'): 1033 event[pkey] = policyTable[policyKey][pkey] + ' ' +i2cdevice 1035 event[pkey] = policyTable[policyKey][pkey]
|
| /openbmc/ |
| D | opengrok1.0.log | [all...] |
| D | opengrok2.0.log | [all...] |