Searched refs:pubkey (Results 26 - 50 of 57) sorted by relevance

123

/freebsd-13-stable/crypto/openssl/crypto/x509/
H A Dx509_req.c67 return X509_PUBKEY_get(req->req_info.pubkey);
74 return X509_PUBKEY_get0(req->req_info.pubkey);
79 return req->req_info.pubkey;
/freebsd-13-stable/crypto/openssl/crypto/cms/
H A Dcms_kari.c53 ASN1_BIT_STRING **pubkey,
73 if (pubkey)
74 *pubkey = NULL;
86 if (pubkey)
87 *pubkey = oik->d.originatorKey->publicKey;
51 CMS_RecipientInfo_kari_get0_orig_id(CMS_RecipientInfo *ri, X509_ALGOR **pubalg, ASN1_BIT_STRING **pubkey, ASN1_OCTET_STRING **keyid, X509_NAME **issuer, ASN1_INTEGER **sno) argument
/freebsd-13-stable/crypto/openssl/ssl/
H A Dssl_rsa.c1029 EVP_PKEY *pubkey = NULL; local
1045 pubkey = X509_get_pubkey(x509); /* bumps reference */
1046 if (pubkey == NULL)
1049 privatekey = pubkey;
1053 if (EVP_PKEY_missing_parameters(pubkey)) {
1058 /* copy to privatekey from pubkey */
1059 EVP_PKEY_copy_parameters(privatekey, pubkey);
1061 } else if (EVP_PKEY_missing_parameters(pubkey)) {
1062 /* copy to pubkey from privatekey */
1063 EVP_PKEY_copy_parameters(pubkey, privateke
[all...]
/freebsd-13-stable/contrib/wpa/src/crypto/
H A Dcrypto_libtomcrypt.c701 u8 *pubkey)
714 pubkey, &pubkey_len) < 0)
718 os_memmove(pubkey + pad, pubkey, pubkey_len);
719 os_memset(pubkey, 0, pad);
729 const u8 *pubkey, size_t pubkey_len,
732 /* TODO: check pubkey */
733 return crypto_mod_exp(pubkey, pubkey_len, privkey, privkey_len,
700 crypto_dh_init(u8 generator, const u8 *prime, size_t prime_len, u8 *privkey, u8 *pubkey) argument
726 crypto_dh_derive_secret(u8 generator, const u8 *prime, size_t prime_len, const u8 *order, size_t order_len, const u8 *privkey, size_t privkey_len, const u8 *pubkey, size_t pubkey_len, u8 *secret, size_t *len) argument
H A Dcrypto_openssl.c521 u8 *pubkey)
534 pubkey, &pubkey_len) < 0)
538 os_memmove(pubkey + pad, pubkey, pubkey_len);
539 os_memset(pubkey, 0, pad);
549 const u8 *pubkey, size_t pubkey_len,
555 pub = BN_bin2bn(pubkey, pubkey_len, NULL);
566 /* verify: pubkey^q == 1 mod p */
580 res = crypto_mod_exp(pubkey, pubkey_len, privkey, privkey_len,
753 struct wpabuf *pubkey local
520 crypto_dh_init(u8 generator, const u8 *prime, size_t prime_len, u8 *privkey, u8 *pubkey) argument
546 crypto_dh_derive_secret(u8 generator, const u8 *prime, size_t prime_len, const u8 *order, size_t order_len, const u8 *privkey, size_t privkey_len, const u8 *pubkey, size_t pubkey_len, u8 *secret, size_t *len) argument
1938 const EC_POINT *pubkey; local
[all...]
H A Dcrypto.h421 u8 *pubkey);
425 const u8 *pubkey, size_t pubkey_len,
/freebsd-13-stable/usr.sbin/pkg/
H A Dpkg.c69 struct pubkey { struct
593 static struct pubkey *
596 struct pubkey *pk;
619 pk = calloc(1, sizeof(struct pubkey));
700 struct pubkey *pk;
701 const char *pubkey; local
705 pubkey = NULL;
707 if (config_string(PUBKEY, &pubkey) != 0) {
718 printf("Verifying signature with public key %s... ", pubkey);
719 if (rsa_verify_cert(fd_pkg, pubkey, NUL
[all...]
/freebsd-13-stable/crypto/heimdal/appl/telnet/libtelnet/
H A Drsaencpwd.c280 * get pubkey
323 char chalkey[160], pubkey[128], *ptr; local
362 memmove(pubkey, ptr, pubkey_len);
367 r = init_rsa_encpwd(&token, user_passwd, challenge, challenge_len, pubkey);
/freebsd-13-stable/contrib/telnet/libtelnet/
H A Drsaencpwd.c276 * get pubkey
319 char chalkey[160], pubkey[128], *ptr; local
358 memmove(pubkey, ptr, pubkey_len);
363 r = init_rsa_encpwd(&token, user_passwd, challenge, challenge_len, pubkey);
/freebsd-13-stable/secure/usr.sbin/sshd/
H A DMakefile14 auth2-none.c auth2-passwd.c auth2-pubkey.c \
/freebsd-13-stable/crypto/openssh/regress/misc/kexfuzz/
H A Dkexfuzz.c204 struct sshkey *pubkey = NULL; local
212 ASSERT_INT_EQ(sshkey_from_private(prvkey, &pubkey), 0);
245 ASSERT_INT_EQ(ssh_add_hostkey(client, pubkey), 0);
303 sshkey_free(pubkey);
/freebsd-13-stable/contrib/wpa/src/wps/
H A Dwps.h909 const u8 *addr, struct wpabuf *pubkey);
917 const struct wpabuf *pubkey,
919 struct wpabuf * wps_nfc_token_build(int ndef, int id, struct wpabuf *pubkey,
921 int wps_nfc_gen_dh(struct wpabuf **pubkey, struct wpabuf **privkey);
922 struct wpabuf * wps_nfc_token_gen(int ndef, int *id, struct wpabuf **pubkey,
H A Dwps_i.h178 const struct wpabuf *pubkey, const u8 *dev_pw,
/freebsd-13-stable/crypto/openssh/
H A Dssh_api.c178 struct sshkey *pubkey = NULL; local
183 if ((r = sshkey_from_private(key, &pubkey)) != 0)
188 sshkey_free(pubkey);
195 k->key = pubkey;
535 _ssh_host_key_sign(struct sshkey *privkey, struct sshkey *pubkey, argument
H A Dsshd.c1501 struct sshkey *pubkey; local
1790 &pubkey, NULL)) != 0 && r != SSH_ERR_SYSTEM_ERROR)
1793 if (pubkey == NULL && key != NULL)
1794 if ((r = sshkey_from_private(key, &pubkey)) != 0)
1798 sensitive_data.host_pubkeys[i] = pubkey;
1800 if (key == NULL && pubkey != NULL && have_agent) {
1803 keytype = pubkey->type;
1825 if ((fp = sshkey_fingerprint(pubkey, options.fingerprint_hash,
1829 key ? "private" : "agent", i, sshkey_ssh_name(pubkey), fp);
2310 sshd_hostkey_sign(struct sshkey *privkey, struct sshkey *pubkey, argument
[all...]
H A Dssh-keygen.c658 EVP_PKEY *pubkey; local
663 if ((pubkey = PEM_read_PUBKEY(fp, NULL, NULL, NULL)) == NULL) {
668 switch (EVP_PKEY_base_id(pubkey)) {
673 (*k)->rsa = EVP_PKEY_get1_RSA(pubkey);
679 (*k)->dsa = EVP_PKEY_get1_DSA(pubkey);
686 (*k)->ecdsa = EVP_PKEY_get1_EC_KEY(pubkey);
691 fatal("%s: unsupported pubkey type %d", __func__,
692 EVP_PKEY_base_id(pubkey));
694 EVP_PKEY_free(pubkey);
/freebsd-13-stable/crypto/openssl/crypto/ec/
H A Dec_pmeth.c156 const EC_POINT *pubkey = NULL; local
172 pubkey = EC_KEY_get0_public_key(ctx->peerkey->pkey.ec);
181 ret = ECDH_compute_key(key, outlen, pubkey, eckey, 0);
/freebsd-13-stable/contrib/ntp/ntpd/
H A Dntp_crypto.c166 struct value pubkey; /* public key */ variable in typeref:struct:value
1331 len = crypto_send(fp, &pubkey, start);
1828 * pubkey public key
1859 if (pubkey.vallen != 0) {
1860 pubkey.tstamp = hostval.tstamp;
1861 pubkey.siglen = 0;
1862 if (pubkey.sig == NULL)
1863 pubkey.sig = emalloc(sign_siglen);
1865 EVP_SignUpdate(ctx, (u_char *)&pubkey, 12);
1866 EVP_SignUpdate(ctx, pubkey
[all...]
/freebsd-13-stable/crypto/openssl/include/crypto/
H A Dx509.h59 X509_PUBKEY *pubkey; /* public key of request */ member in struct:X509_req_info_st
/freebsd-13-stable/crypto/openssl/engines/
H A De_capi.c630 unsigned char *pubkey = NULL; local
642 pubkey = OPENSSL_malloc(len);
644 if (pubkey == NULL)
647 if (!CryptExportKey(key->key, 0, PUBLICKEYBLOB, 0, pubkey, &len)) {
653 bh = (BLOBHEADER *) pubkey;
767 OPENSSL_free(pubkey);
/freebsd-13-stable/crypto/openssl/crypto/dsa/
H A Ddsa_ameth.c20 static int dsa_pub_decode(EVP_PKEY *pkey, X509_PUBKEY *pubkey) argument
32 if (!X509_PUBKEY_get0_param(NULL, &p, &pklen, &palg, pubkey))
134 * AlgorithmIdentifier the pubkey must be recalculated.
/freebsd-13-stable/crypto/openssl/apps/
H A Dreq.c105 {"pubkey", OPT_PUBKEY, '-', "Output public key"},
242 int nodes = 0, newhdr = 0, subject = 0, pubkey = 0, precert = 0; local
286 pubkey = 1;
864 if (noout && !text && !modulus && !subject && !pubkey) {
876 if (pubkey) {
H A Dx509.c89 {"pubkey", OPT_PUBKEY, '-', "Output the public key"},
172 int x509req = 0, days = DEF_DAYS, modulus = 0, pubkey = 0, pprint = 0; local
348 pubkey = ++num;
729 } else if (pubkey == i) {
/freebsd-13-stable/contrib/wpa/src/common/
H A Ddpp.c793 EVP_PKEY_free(info->pubkey);
1036 wpa_printf(MSG_DEBUG, "DPP: Could not set pubkey");
1084 bi->pubkey = pkey;
1435 der = dpp_bootstrap_key_der(bi->pubkey);
1475 bi->pubkey = dpp_set_keypair(&bi->curve, privkey, privkey_len);
1477 bi->pubkey = dpp_gen_keypair(bi->curve);
1478 if (!bi->pubkey)
1482 der = dpp_bootstrap_key_der(bi->pubkey);
2298 if (dpp_ecdh(auth->own_protocol_key, auth->peer_bi->pubkey,
2549 bix = dpp_get_pubkey_point(auth->own_bi->pubkey,
[all...]
/freebsd-13-stable/crypto/openssl/include/openssl/
H A Dcms.h307 ASN1_BIT_STRING **pubkey,

Completed in 468 milliseconds

123