/freebsd-9.3-release/crypto/openssl/apps/ |
H A D | x509.c | 151 static int sign(X509 *x, EVP_PKEY *pkey, int days, int clrext, 154 X509 *x, X509 *xca, EVP_PKEY *pkey, char *serial, 501 EVP_PKEY *pkey; local 540 if ((pkey = X509_REQ_get_pubkey(req)) == NULL) { 544 i = X509_REQ_verify(req, pkey); 545 EVP_PKEY_free(pkey); 583 pkey = X509_REQ_get_pubkey(req); 584 X509_set_pubkey(x, pkey); 585 EVP_PKEY_free(pkey); 701 EVP_PKEY *pkey; local 724 EVP_PKEY *pkey; local 1018 x509_certify(X509_STORE *ctx, char *CAfile, const EVP_MD *digest, X509 *x, X509 *xca, EVP_PKEY *pkey, char *serialfile, int create, int days, int clrext, CONF *conf, char *section, ASN1_INTEGER *sno) argument 1131 sign(X509 *x, EVP_PKEY *pkey, int days, int clrext, const EVP_MD *digest, CONF *conf, char *section) argument [all...] |
H A D | dsa.c | 251 EVP_PKEY *pkey; local 253 pkey = load_pubkey(bio_err, infile, informat, 1, 256 pkey = load_key(bio_err, infile, informat, 1, 259 if (pkey != NULL) 260 dsa = pkey == NULL ? NULL : EVP_PKEY_get1_DSA(pkey); 261 EVP_PKEY_free(pkey);
|
H A D | rsa.c | 262 EVP_PKEY *pkey; local 265 pkey = load_pubkey(bio_err, infile, 270 pkey = load_key(bio_err, infile, 275 if (pkey != NULL) 276 rsa = pkey == NULL ? NULL : EVP_PKEY_get1_RSA(pkey); 277 EVP_PKEY_free(pkey);
|
H A D | rsautl.c | 100 EVP_PKEY *pkey = NULL; local 211 pkey = load_key(bio_err, keyfile, keyform, 0, 216 pkey = load_pubkey(bio_err, keyfile, keyform, 0, 223 pkey = X509_get_pubkey(x); 229 if (!pkey) { 233 rsa = EVP_PKEY_get1_RSA(pkey); 234 EVP_PKEY_free(pkey);
|
H A D | req.c | 131 static int make_REQ(X509_REQ *req, EVP_PKEY *pkey, char *dn, int mutlirdn, 179 EVP_PKEY *pkey = NULL; local 322 dsa_params = DSAparams_dup(dtmp->pkey.dsa); 365 ec_params = EC_KEY_dup(dtmp->pkey.ec); 692 pkey = load_key(bio_err, keyfile, keyform, 0, passin, e, 694 if (!pkey) { 707 if (newreq && (pkey == NULL)) { 734 if ((pkey = EVP_PKEY_new()) == NULL) 744 !EVP_PKEY_assign_RSA(pkey, rsa)) { 758 if (!EVP_PKEY_assign_DSA(pkey, dsa_param 1148 make_REQ(X509_REQ *req, EVP_PKEY *pkey, char *subj, int multirdn, int attribs, unsigned long chtype) argument [all...] |
/freebsd-9.3-release/crypto/openssl/crypto/x509/ |
H A D | x509_r2x.c | 68 X509 *X509_REQ_to_X509(X509_REQ *r, int days, EVP_PKEY *pkey) argument 105 if (!X509_sign(ret, pkey, EVP_md5()))
|
H A D | x_all.c | 100 int X509_sign(X509 *x, EVP_PKEY *pkey, const EVP_MD *md) argument 104 x->sig_alg, x->signature, x->cert_info, pkey, md)); 107 int X509_REQ_sign(X509_REQ *x, EVP_PKEY *pkey, const EVP_MD *md) argument 110 x->signature, x->req_info, pkey, md)); 113 int X509_CRL_sign(X509_CRL *x, EVP_PKEY *pkey, const EVP_MD *md) argument 117 x->sig_alg, x->signature, x->crl, pkey, md)); 120 int NETSCAPE_SPKI_sign(NETSCAPE_SPKI *x, EVP_PKEY *pkey, const EVP_MD *md) argument 123 x->signature, x->spkac, pkey, md)); 463 int i2d_PrivateKey_fp(FILE *fp, EVP_PKEY *pkey) argument 465 return ASN1_i2d_fp_of(EVP_PKEY, i2d_PrivateKey, fp, pkey); 473 i2d_PUBKEY_fp(FILE *fp, EVP_PKEY *pkey) argument 510 i2d_PrivateKey_bio(BIO *bp, EVP_PKEY *pkey) argument 520 i2d_PUBKEY_bio(BIO *bp, EVP_PKEY *pkey) argument [all...] |
H A D | x509.h | 160 EVP_PKEY *pkey; member in struct:X509_pubkey_st 545 ASN1_TYPE *pkey; member in struct:pkcs8_priv_key_info_st 568 # define X509_sign(x,pkey,md) \ 570 x->sig_alg, x->signature, (char *)x->cert_info,pkey,md) 571 # define X509_REQ_sign(x,pkey,md) \ 573 x->signature, (char *)x->req_info,pkey,md) 574 # define X509_CRL_sign(x,pkey,md) \ 576 x->signature, (char *)x->crl,pkey,md) 577 # define NETSCAPE_SPKI_sign(x,pkey,md) \ 579 x->signature, (char *)x->spkac,pkey,m [all...] |
/freebsd-9.3-release/contrib/ofed/management/opensm/opensm/ |
H A D | osm_pkey_mgr.c | 58 The max number of pkey blocks for a physical port is located in 79 * Insert new pending pkey entry to the specific port pkey table 85 IN const ib_net16_t pkey, 98 "Failed to allocate new pending pkey entry for node " 104 p_pending->pkey = pkey; 105 p_orig_pkey = cl_map_get(&p_pkey_tbl->keys, ib_pkey_get_base(pkey)); 113 ib_pkey_get_base(pkey)); 122 ib_pkey_get_base(pkey), 83 pkey_mgr_process_physical_port(IN osm_log_t * p_log, IN osm_sm_t * sm, IN const ib_net16_t pkey, IN osm_physp_t * p_physp) argument 149 ib_net16_t pkey = p_prtn->pkey; local [all...] |
H A D | osm_sa_path_record.c | 82 ib_net16_t pkey; member in struct:osm_path_parms 185 ib_net16_t pkey; local 588 pkey = osm_physp_find_common_pkey(p_src_physp, p_dest_physp); 592 * PR request has a specific pkey: 593 * Check that source and destination share this pkey. 594 * If QoS level has pkeys, check that this pkey exists 596 * PR returned pkey is the requested pkey. 598 pkey = p_pr->pkey; [all...] |
/freebsd-9.3-release/contrib/ntp/util/ |
H A D | ntp-keygen.c | 314 EVP_PKEY *pkey = NULL; /* temp key */ local 655 pkey = EVP_PKEY_new(); 656 EVP_PKEY_assign_RSA(pkey, rsa); 657 PEM_write_PKCS8PrivateKey(stdout, pkey, NULL, NULL, 0, 677 pkey = EVP_PKEY_new(); 678 EVP_PKEY_assign_RSA(pkey, rsa); 679 PEM_write_PKCS8PrivateKey(stdout, pkey, cipher, NULL, 0, 721 pkey = EVP_PKEY_new(); 722 EVP_PKEY_assign_DSA(pkey, dsa); 723 PEM_write_PKCS8PrivateKey(stdout, pkey, NUL 904 EVP_PKEY *pkey = NULL; /* public/private key */ local 982 EVP_PKEY *pkey; /* private key */ local 1035 EVP_PKEY *pkey; /* private key */ local 1134 EVP_PKEY *pkey; /* private key */ local 1313 EVP_PKEY *pkey; /* private key */ local 1529 EVP_PKEY *pkey, *pkey1; /* private keys */ local 1942 x509( EVP_PKEY *pkey, const EVP_MD *md, char *gqpub, const char *exten, char *name ) argument [all...] |
/freebsd-9.3-release/sys/contrib/rdma/ |
H A D | ib_addr.h | 116 static inline void ib_addr_set_pkey(struct rdma_dev_addr *dev_addr, u16 pkey) argument 118 dev_addr->broadcast[8] = pkey >> 8; 119 dev_addr->broadcast[9] = (unsigned char) pkey;
|
/freebsd-9.3-release/crypto/openssl/crypto/evp/ |
H A D | evp.h | 149 } pkey; member in struct:evp_pkey_st 163 * and pkey. This is required because for various smart-card perform the 173 EVP_PKEY_METHOD *pkey; 447 # define EVP_PKEY_assign_RSA(pkey,rsa) EVP_PKEY_assign((pkey),EVP_PKEY_RSA,\ 452 # define EVP_PKEY_assign_DSA(pkey,dsa) EVP_PKEY_assign((pkey),EVP_PKEY_DSA,\ 457 # define EVP_PKEY_assign_DH(pkey,dh) EVP_PKEY_assign((pkey),EVP_PKEY_DH,\ 462 # define EVP_PKEY_assign_EC_KEY(pkey,ecke [all...] |
/freebsd-9.3-release/contrib/wpa/src/crypto/ |
H A D | crypto_nss.c | 60 u8 pkey[8], next, tmp; local 67 pkey[i] = (tmp >> i) | next | 1; 70 pkey[i] = next | 1; 79 item.data = pkey;
|
/freebsd-9.3-release/sys/ofed/include/rdma/ |
H A D | ib_user_sa.h | 63 __be16 pkey; member in struct:ib_user_path_rec
|
/freebsd-9.3-release/lib/libc/rpc/ |
H A D | auth_des.c | 130 netobj pkey; local 140 pkey.n_bytes = (char *) pkey_data; 141 pkey.n_len = (u_int)strlen((char *)pkey_data) + 1; 142 dummy = authdes_pk_seccreate(servername, &pkey, win, timehost, 153 authdes_pk_seccreate(const char *servername, netobj *pkey, u_int window, argument 180 memcpy(ad->ad_pkey, pkey->n_bytes, pkey->n_len); 429 netobj pkey; local 445 pkey.n_bytes = (char *)(ad->ad_pkey); 446 pkey [all...] |
/freebsd-9.3-release/crypto/openssl/fips/ |
H A D | fips.c | 429 int fips_pkey_signature_test(EVP_PKEY *pkey, argument 441 if ((pkey->type == EVP_PKEY_RSA) 442 && (RSA_size(pkey->pkey.rsa) > sizeof(sigtmp))) { 443 sig = OPENSSL_malloc(RSA_size(pkey->pkey.rsa)); 460 if (!EVP_SignFinal(&mctx, sig, &siglen, pkey)) 470 ret = EVP_VerifyFinal(&mctx, sig, siglen, pkey);
|
/freebsd-9.3-release/crypto/openssl/crypto/asn1/ |
H A D | a_sign.c | 130 ASN1_BIT_STRING *signature, char *data, EVP_PKEY *pkey, 174 outll = outl = EVP_PKEY_size(pkey); 187 (unsigned int *)&outl, pkey)) { 220 EVP_PKEY *pkey, const EVP_MD *type) 263 outll = outl = EVP_PKEY_size(pkey); 278 (unsigned int *)&outl, pkey)) { 129 ASN1_sign(i2d_of_void *i2d, X509_ALGOR *algor1, X509_ALGOR *algor2, ASN1_BIT_STRING *signature, char *data, EVP_PKEY *pkey, const EVP_MD *type) argument 218 ASN1_item_sign(const ASN1_ITEM *it, X509_ALGOR *algor1, X509_ALGOR *algor2, ASN1_BIT_STRING *signature, void *asn, EVP_PKEY *pkey, const EVP_MD *type) argument
|
/freebsd-9.3-release/crypto/openssl/ssl/ |
H A D | d1_clnt.c | 778 EVP_PKEY *pkey = NULL; local 810 pkey = 814 if ((pkey == NULL) || (pkey->type != EVP_PKEY_RSA) 815 || (pkey->pkey.rsa == NULL)) { 820 rsa = pkey->pkey.rsa; 821 EVP_PKEY_free(pkey); 1089 EVP_PKEY *pkey; local 1160 EVP_PKEY *pkey = NULL; local [all...] |
H A D | s3_clnt.c | 896 EVP_PKEY *pkey = NULL; local 1004 pkey = X509_get_pubkey(x); 1012 printf("pkey,x = %p, %p\n", (void *)pkey, (void *)x); 1013 printf("ssl_cert_type(x,pkey) = %d\n", ssl_cert_type(x, pkey)); 1018 if (need_cert && ((pkey == NULL) || EVP_PKEY_missing_parameters(pkey))) { 1026 i = ssl_cert_type(x, pkey); 1069 EVP_PKEY_free(pkey); 1084 EVP_PKEY *pkey = NULL; local 1905 EVP_PKEY *pkey = NULL; local 2403 EVP_PKEY *pkey; local 2480 EVP_PKEY *pkey = NULL; local 2552 EVP_PKEY *pkey = NULL; local [all...] |
/freebsd-9.3-release/crypto/openssl/crypto/pkcs7/ |
H A D | pk7_doit.c | 147 EVP_PKEY *pkey; local 257 if ((pkey = X509_get_pubkey(ri->cert)) == NULL) 259 jj = EVP_PKEY_size(pkey); 260 EVP_PKEY_free(pkey); 270 if ((pkey = X509_get_pubkey(ri->cert)) == NULL) 272 jj = EVP_PKEY_encrypt(tmp, key, keylen, pkey); 273 EVP_PKEY_free(pkey); 332 BIO *PKCS7_dataDecode(PKCS7 *p7, EVP_PKEY *pkey, BIO *in_bio, X509 *pcert) argument 475 jj = EVP_PKEY_size(pkey); 504 pkey); 925 EVP_PKEY *pkey; local [all...] |
H A D | pk7_lib.c | 354 int PKCS7_SIGNER_INFO_set(PKCS7_SIGNER_INFO *p7i, X509 *x509, EVP_PKEY *pkey, argument 360 if (pkey->type == EVP_PKEY_DSA || pkey->type == EVP_PKEY_EC) 380 /* lets keep the pkey around for a while */ 381 CRYPTO_add(&pkey->references, 1, CRYPTO_LOCK_EVP_PKEY); 382 p7i->pkey = pkey; 398 nid = EVP_PKEY_type(pkey->type); 433 PKCS7_SIGNER_INFO *PKCS7_add_signature(PKCS7 *p7, X509 *x509, EVP_PKEY *pkey, argument 440 if (!PKCS7_SIGNER_INFO_set(si, x509, pkey, dgs [all...] |
/freebsd-9.3-release/crypto/openssl/demos/engines/ibmca/ |
H A D | hw_ibmca.c | 620 char *pkey = NULL; local 725 pkey = (char *)privKey->keyRecord; 733 /* pkey += pSize - BN_num_bytes(p); WROING this should be dmp1) */ 734 pkey += pSize - BN_num_bytes(dmp1); 735 BN_bn2bin(dmp1, pkey); 736 pkey += BN_num_bytes(dmp1); /* move the pointer */ 738 BN_bn2bin(dmq1, pkey); /* Copy over dmq1 */ 740 pkey += qSize; /* move pointer */ 742 pkey += pSize - BN_num_bytes(p); 744 BN_bn2bin(p, pkey); [all...] |
/freebsd-9.3-release/crypto/openssl/crypto/cms/ |
H A D | cms_sd.c | 300 si->pkey = pk; 494 if (si->pkey) 495 EVP_PKEY_free(si->pkey); 496 si->pkey = X509_get_pubkey(signer); 566 *pk = si->pkey; 581 static void cms_fixup_mctx(EVP_MD_CTX *mctx, EVP_PKEY *pkey) argument 586 if (pkey->type == EVP_PKEY_DSA) 590 if (pkey->type == EVP_PKEY_EC) 602 if (!si->pkey) { 632 sig = OPENSSL_malloc(EVP_PKEY_size(si->pkey)); [all...] |
/freebsd-9.3-release/crypto/openssl/crypto/pem/ |
H A D | pem_seal.c | 84 j = RSA_size(pubk[i]->pkey.rsa); 107 RSA_size(pubk[i]->pkey.rsa)); 155 i = RSA_size(priv->pkey.rsa);
|