/freebsd-13-stable/crypto/openssl/crypto/x509/ |
H A D | x509_req.c | 67 return X509_PUBKEY_get(req->req_info.pubkey); 74 return X509_PUBKEY_get0(req->req_info.pubkey); 79 return req->req_info.pubkey;
|
/freebsd-13-stable/crypto/openssl/crypto/cms/ |
H A D | cms_kari.c | 53 ASN1_BIT_STRING **pubkey, 73 if (pubkey) 74 *pubkey = NULL; 86 if (pubkey) 87 *pubkey = oik->d.originatorKey->publicKey; 51 CMS_RecipientInfo_kari_get0_orig_id(CMS_RecipientInfo *ri, X509_ALGOR **pubalg, ASN1_BIT_STRING **pubkey, ASN1_OCTET_STRING **keyid, X509_NAME **issuer, ASN1_INTEGER **sno) argument
|
/freebsd-13-stable/crypto/openssl/ssl/ |
H A D | ssl_rsa.c | 1029 EVP_PKEY *pubkey = NULL; local 1045 pubkey = X509_get_pubkey(x509); /* bumps reference */ 1046 if (pubkey == NULL) 1049 privatekey = pubkey; 1053 if (EVP_PKEY_missing_parameters(pubkey)) { 1058 /* copy to privatekey from pubkey */ 1059 EVP_PKEY_copy_parameters(privatekey, pubkey); 1061 } else if (EVP_PKEY_missing_parameters(pubkey)) { 1062 /* copy to pubkey from privatekey */ 1063 EVP_PKEY_copy_parameters(pubkey, privateke [all...] |
/freebsd-13-stable/contrib/wpa/src/crypto/ |
H A D | crypto_libtomcrypt.c | 701 u8 *pubkey) 714 pubkey, &pubkey_len) < 0) 718 os_memmove(pubkey + pad, pubkey, pubkey_len); 719 os_memset(pubkey, 0, pad); 729 const u8 *pubkey, size_t pubkey_len, 732 /* TODO: check pubkey */ 733 return crypto_mod_exp(pubkey, pubkey_len, privkey, privkey_len, 700 crypto_dh_init(u8 generator, const u8 *prime, size_t prime_len, u8 *privkey, u8 *pubkey) argument 726 crypto_dh_derive_secret(u8 generator, const u8 *prime, size_t prime_len, const u8 *order, size_t order_len, const u8 *privkey, size_t privkey_len, const u8 *pubkey, size_t pubkey_len, u8 *secret, size_t *len) argument
|
H A D | crypto_openssl.c | 521 u8 *pubkey) 534 pubkey, &pubkey_len) < 0) 538 os_memmove(pubkey + pad, pubkey, pubkey_len); 539 os_memset(pubkey, 0, pad); 549 const u8 *pubkey, size_t pubkey_len, 555 pub = BN_bin2bn(pubkey, pubkey_len, NULL); 566 /* verify: pubkey^q == 1 mod p */ 580 res = crypto_mod_exp(pubkey, pubkey_len, privkey, privkey_len, 753 struct wpabuf *pubkey local 520 crypto_dh_init(u8 generator, const u8 *prime, size_t prime_len, u8 *privkey, u8 *pubkey) argument 546 crypto_dh_derive_secret(u8 generator, const u8 *prime, size_t prime_len, const u8 *order, size_t order_len, const u8 *privkey, size_t privkey_len, const u8 *pubkey, size_t pubkey_len, u8 *secret, size_t *len) argument 1938 const EC_POINT *pubkey; local [all...] |
H A D | crypto.h | 421 u8 *pubkey); 425 const u8 *pubkey, size_t pubkey_len,
|
/freebsd-13-stable/usr.sbin/pkg/ |
H A D | pkg.c | 69 struct pubkey { struct 593 static struct pubkey * 596 struct pubkey *pk; 619 pk = calloc(1, sizeof(struct pubkey)); 700 struct pubkey *pk; 701 const char *pubkey; local 705 pubkey = NULL; 707 if (config_string(PUBKEY, &pubkey) != 0) { 718 printf("Verifying signature with public key %s... ", pubkey); 719 if (rsa_verify_cert(fd_pkg, pubkey, NUL [all...] |
/freebsd-13-stable/crypto/heimdal/appl/telnet/libtelnet/ |
H A D | rsaencpwd.c | 280 * get pubkey 323 char chalkey[160], pubkey[128], *ptr; local 362 memmove(pubkey, ptr, pubkey_len); 367 r = init_rsa_encpwd(&token, user_passwd, challenge, challenge_len, pubkey);
|
/freebsd-13-stable/contrib/telnet/libtelnet/ |
H A D | rsaencpwd.c | 276 * get pubkey 319 char chalkey[160], pubkey[128], *ptr; local 358 memmove(pubkey, ptr, pubkey_len); 363 r = init_rsa_encpwd(&token, user_passwd, challenge, challenge_len, pubkey);
|
/freebsd-13-stable/secure/usr.sbin/sshd/ |
H A D | Makefile | 14 auth2-none.c auth2-passwd.c auth2-pubkey.c \
|
/freebsd-13-stable/crypto/openssh/regress/misc/kexfuzz/ |
H A D | kexfuzz.c | 204 struct sshkey *pubkey = NULL; local 212 ASSERT_INT_EQ(sshkey_from_private(prvkey, &pubkey), 0); 245 ASSERT_INT_EQ(ssh_add_hostkey(client, pubkey), 0); 303 sshkey_free(pubkey);
|
/freebsd-13-stable/contrib/wpa/src/wps/ |
H A D | wps.h | 909 const u8 *addr, struct wpabuf *pubkey); 917 const struct wpabuf *pubkey, 919 struct wpabuf * wps_nfc_token_build(int ndef, int id, struct wpabuf *pubkey, 921 int wps_nfc_gen_dh(struct wpabuf **pubkey, struct wpabuf **privkey); 922 struct wpabuf * wps_nfc_token_gen(int ndef, int *id, struct wpabuf **pubkey,
|
H A D | wps_i.h | 178 const struct wpabuf *pubkey, const u8 *dev_pw,
|
/freebsd-13-stable/crypto/openssh/ |
H A D | ssh_api.c | 178 struct sshkey *pubkey = NULL; local 183 if ((r = sshkey_from_private(key, &pubkey)) != 0) 188 sshkey_free(pubkey); 195 k->key = pubkey; 535 _ssh_host_key_sign(struct sshkey *privkey, struct sshkey *pubkey, argument
|
H A D | sshd.c | 1501 struct sshkey *pubkey; local 1790 &pubkey, NULL)) != 0 && r != SSH_ERR_SYSTEM_ERROR) 1793 if (pubkey == NULL && key != NULL) 1794 if ((r = sshkey_from_private(key, &pubkey)) != 0) 1798 sensitive_data.host_pubkeys[i] = pubkey; 1800 if (key == NULL && pubkey != NULL && have_agent) { 1803 keytype = pubkey->type; 1825 if ((fp = sshkey_fingerprint(pubkey, options.fingerprint_hash, 1829 key ? "private" : "agent", i, sshkey_ssh_name(pubkey), fp); 2310 sshd_hostkey_sign(struct sshkey *privkey, struct sshkey *pubkey, argument [all...] |
H A D | ssh-keygen.c | 658 EVP_PKEY *pubkey; local 663 if ((pubkey = PEM_read_PUBKEY(fp, NULL, NULL, NULL)) == NULL) { 668 switch (EVP_PKEY_base_id(pubkey)) { 673 (*k)->rsa = EVP_PKEY_get1_RSA(pubkey); 679 (*k)->dsa = EVP_PKEY_get1_DSA(pubkey); 686 (*k)->ecdsa = EVP_PKEY_get1_EC_KEY(pubkey); 691 fatal("%s: unsupported pubkey type %d", __func__, 692 EVP_PKEY_base_id(pubkey)); 694 EVP_PKEY_free(pubkey);
|
/freebsd-13-stable/crypto/openssl/crypto/ec/ |
H A D | ec_pmeth.c | 156 const EC_POINT *pubkey = NULL; local 172 pubkey = EC_KEY_get0_public_key(ctx->peerkey->pkey.ec); 181 ret = ECDH_compute_key(key, outlen, pubkey, eckey, 0);
|
/freebsd-13-stable/contrib/ntp/ntpd/ |
H A D | ntp_crypto.c | 166 struct value pubkey; /* public key */ variable in typeref:struct:value 1331 len = crypto_send(fp, &pubkey, start); 1828 * pubkey public key 1859 if (pubkey.vallen != 0) { 1860 pubkey.tstamp = hostval.tstamp; 1861 pubkey.siglen = 0; 1862 if (pubkey.sig == NULL) 1863 pubkey.sig = emalloc(sign_siglen); 1865 EVP_SignUpdate(ctx, (u_char *)&pubkey, 12); 1866 EVP_SignUpdate(ctx, pubkey [all...] |
/freebsd-13-stable/crypto/openssl/include/crypto/ |
H A D | x509.h | 59 X509_PUBKEY *pubkey; /* public key of request */ member in struct:X509_req_info_st
|
/freebsd-13-stable/crypto/openssl/engines/ |
H A D | e_capi.c | 630 unsigned char *pubkey = NULL; local 642 pubkey = OPENSSL_malloc(len); 644 if (pubkey == NULL) 647 if (!CryptExportKey(key->key, 0, PUBLICKEYBLOB, 0, pubkey, &len)) { 653 bh = (BLOBHEADER *) pubkey; 767 OPENSSL_free(pubkey);
|
/freebsd-13-stable/crypto/openssl/crypto/dsa/ |
H A D | dsa_ameth.c | 20 static int dsa_pub_decode(EVP_PKEY *pkey, X509_PUBKEY *pubkey) argument 32 if (!X509_PUBKEY_get0_param(NULL, &p, &pklen, &palg, pubkey)) 134 * AlgorithmIdentifier the pubkey must be recalculated.
|
/freebsd-13-stable/crypto/openssl/apps/ |
H A D | req.c | 105 {"pubkey", OPT_PUBKEY, '-', "Output public key"}, 242 int nodes = 0, newhdr = 0, subject = 0, pubkey = 0, precert = 0; local 286 pubkey = 1; 864 if (noout && !text && !modulus && !subject && !pubkey) { 876 if (pubkey) {
|
H A D | x509.c | 89 {"pubkey", OPT_PUBKEY, '-', "Output the public key"}, 172 int x509req = 0, days = DEF_DAYS, modulus = 0, pubkey = 0, pprint = 0; local 348 pubkey = ++num; 729 } else if (pubkey == i) {
|
/freebsd-13-stable/contrib/wpa/src/common/ |
H A D | dpp.c | 793 EVP_PKEY_free(info->pubkey); 1036 wpa_printf(MSG_DEBUG, "DPP: Could not set pubkey"); 1084 bi->pubkey = pkey; 1435 der = dpp_bootstrap_key_der(bi->pubkey); 1475 bi->pubkey = dpp_set_keypair(&bi->curve, privkey, privkey_len); 1477 bi->pubkey = dpp_gen_keypair(bi->curve); 1478 if (!bi->pubkey) 1482 der = dpp_bootstrap_key_der(bi->pubkey); 2298 if (dpp_ecdh(auth->own_protocol_key, auth->peer_bi->pubkey, 2549 bix = dpp_get_pubkey_point(auth->own_bi->pubkey, [all...] |
/freebsd-13-stable/crypto/openssl/include/openssl/ |
H A D | cms.h | 307 ASN1_BIT_STRING **pubkey,
|