/freebsd-9.3-release/contrib/ntp/include/ |
H A D | ntp_crypto.h | 158 EVP_PKEY *pkey; /* generic key */ member in struct:cert_info 176 EVP_PKEY *pkey; /* generic key */ member in struct:pkey_info
|
/freebsd-9.3-release/crypto/openssl/ssl/ |
H A D | s2_clnt.c | 772 EVP_PKEY *pkey = NULL; local 782 i = s->ctx->client_cert_cb(s, &(x509), &(pkey)); 791 if ((i == 1) && (pkey != NULL) && (x509 != NULL)) { 793 if (!SSL_use_certificate(s, x509) || !SSL_use_PrivateKey(s, pkey)) { 797 EVP_PKEY_free(pkey); 801 if (pkey != NULL) 802 EVP_PKEY_free(pkey); 996 EVP_PKEY *pkey = NULL; local 1035 pkey = X509_get_pubkey(x509); 1037 if (pkey 1060 EVP_PKEY *pkey = NULL; local [all...] |
H A D | s3_srvr.c | 1310 EVP_PKEY *pkey; local 1540 if ((pkey = ssl_get_sign_pkey(s, s->s3->tmp.new_cipher)) 1545 kn = EVP_PKEY_size(pkey); 1547 pkey = NULL; 1589 if (pkey != NULL) { 1595 if (pkey->type == EVP_PKEY_RSA) { 1613 &(p[2]), &u, pkey->pkey.rsa) <= 0) { 1622 if (pkey->type == EVP_PKEY_DSA) { 1631 (unsigned int *)&i, pkey)) { 1790 EVP_PKEY *pkey = NULL; local 2343 EVP_PKEY *pkey = NULL; local [all...] |
H A D | d1_srvr.c | 876 EVP_PKEY *pkey; local 988 if ((pkey = ssl_get_sign_pkey(s, s->s3->tmp.new_cipher)) 993 kn = EVP_PKEY_size(pkey); 995 pkey = NULL; 1013 if (pkey != NULL) { 1020 if (pkey->type == EVP_PKEY_RSA) { 1037 &(p[2]), &u, pkey->pkey.rsa) <= 0) { 1046 if (pkey->type == EVP_PKEY_DSA) { 1055 (unsigned int *)&i, pkey)) { [all...] |
/freebsd-9.3-release/crypto/openssl/crypto/x509/ |
H A D | x509_set.c | 142 int X509_set_pubkey(X509 *x, EVP_PKEY *pkey) argument 146 return (X509_PUBKEY_set(&(x->cert_info->key), pkey));
|
H A D | x509_req.c | 69 X509_REQ *X509_to_X509_REQ(X509 *x, EVP_PKEY *pkey, const EVP_MD *md) argument 101 if (pkey != NULL) { 102 if (!X509_REQ_sign(ret, pkey, md))
|
/freebsd-9.3-release/sys/ofed/drivers/infiniband/ulp/ipoib/ |
H A D | ipoib_main.c | 581 path->pathrec.pkey = cpu_to_be16(priv->pkey); 697 eh->hwaddr[8] = (priv->pkey >> 8) & 0xff; 698 eh->hwaddr[9] = priv->pkey & 0xff; 964 result = ib_query_pkey(hca, port, 0, &priv->pkey); 978 priv->pkey |= 0x8000; 980 priv->broadcastaddr[8] = priv->pkey >> 8; 981 priv->broadcastaddr[9] = priv->pkey & 0xff; 1097 uint16_t pkey; local 1108 /* We only support 15 bits of pkey 1165 uint16_t pkey; local [all...] |
/freebsd-9.3-release/contrib/ofed/libibverbs/src/ |
H A D | marshall.c | 108 dst->pkey = src->pkey; 133 dst->pkey = src->pkey;
|
/freebsd-9.3-release/contrib/ofed/management/opensm/opensm/ |
H A D | osm_qos_policy.c | 317 IN ib_net16_t pkey) 323 cl_ntoh16(pkey)); 341 * Think how to find shared pkey that also exists 592 uint16_t pkey, 702 pkey & 0x7FFF)) { 809 "ERR AC15: pkey 0x%04X in match rule - " 811 cl_ntoh16(p_prtn->pkey), p_prtn->sl, 826 "pkey 0x%04X not found\n", 827 cl_ntoh16(p_prtn->pkey)); 831 CL_ASSERT((cl_ntoh16(p_mgrp->mcmember_rec.pkey) 316 osm_qos_level_has_pkey(IN const osm_qos_level_t * p_qos_level, IN ib_net16_t pkey) argument 588 __qos_policy_get_match_rule_by_params( const osm_qos_policy_t * p_qos_policy, uint64_t service_id, uint16_t qos_class, uint16_t pkey, const osm_physp_t * p_src_physp, const osm_physp_t * p_dest_physp, ib_net64_t comp_mask) argument 861 ib_net16_t pkey; local 1016 __qos_policy_get_qos_level_by_params( IN const osm_qos_policy_t * p_qos_policy, IN const osm_physp_t * p_src_physp, IN const osm_physp_t * p_dest_physp, IN uint64_t service_id, IN uint16_t qos_class, IN uint16_t pkey, IN ib_net64_t comp_mask) argument [all...] |
H A D | osm_prtn_config.c | 66 const char *name, uint16_t pkey); 81 uint16_t pkey; local 92 pkey = (uint16_t) strtoul(id, &end, 0); 96 pkey = 0; 99 name, cl_hton16(pkey));
|
/freebsd-9.3-release/sys/ofed/drivers/infiniband/core/ |
H A D | uverbs_marshall.c | 103 dst->pkey = src->pkey; 129 dst->pkey = src->pkey;
|
/freebsd-9.3-release/crypto/openssl/fips/ |
H A D | fips.h | 90 int fips_pkey_signature_test(struct evp_pkey_st *pkey,
|
/freebsd-9.3-release/crypto/openssl/crypto/evp/ |
H A D | p_open.c | 90 size = RSA_size(priv->pkey.rsa);
|
/freebsd-9.3-release/crypto/openssl/crypto/cms/ |
H A D | cms_env.c | 178 ktri->pkey = pk; 241 *pk = ktri->pkey; 275 int CMS_RecipientInfo_set0_pkey(CMS_RecipientInfo *ri, EVP_PKEY *pkey) argument 281 ri->d.ktri->pkey = pkey; 304 eklen = EVP_PKEY_size(ktri->pkey); 313 eklen = EVP_PKEY_encrypt(ek, ec->key, ec->keylen, ktri->pkey); 342 if (ktri->pkey == NULL) { 347 eklen = EVP_PKEY_size(ktri->pkey); 358 ktri->encryptedKey->length, ktri->pkey); [all...] |
/freebsd-9.3-release/crypto/openssl/apps/ |
H A D | crl.c | 118 EVP_PKEY *pkey; local 258 pkey = X509_get_pubkey(xobj.data.x509); 260 if (!pkey) { 264 i = X509_CRL_verify(x, pkey); 265 EVP_PKEY_free(pkey);
|
H A D | apps.c | 704 EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca) 736 ret = PKCS12_parse(p12, pass, pkey, cert, ca); 838 EVP_PKEY *pkey = NULL; local 853 pkey = ENGINE_load_private_key(e, file, ui_method, &cb_data); 854 if (!pkey) { 876 pkey = d2i_PrivateKey_bio(key, NULL); 878 pkey = PEM_read_bio_PrivateKey(key, NULL, 884 pkey = load_netscape_key(err, key, file, key_descrip, format); 889 &pkey, NULL, NULL)) 898 if (pkey 702 load_pkcs12(BIO *err, BIO *in, const char *desc, pem_password_cb *pem_cb, void *cb_data, EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca) argument 909 EVP_PKEY *pkey = NULL; local 968 EVP_PKEY *pkey; local [all...] |
H A D | ca.c | 200 static int certify(X509 **xret, char *infile, EVP_PKEY *pkey, X509 *x509, 208 static int certify_cert(X509 **xret, char *infile, EVP_PKEY *pkey, X509 *x509, 216 static int certify_spkac(X509 **xret, char *infile, EVP_PKEY *pkey, 226 static int do_body(X509 **xret, EVP_PKEY *pkey, X509 *x509, 279 EVP_PKEY *pkey = NULL; local 697 pkey = load_key(bio_err, keyfile, keyform, 0, key, e, "CA private key"); 700 if (pkey == NULL) { 720 if (!X509_check_private_key(x509, pkey)) { 1080 j = certify_spkac(&x, spkac_file, pkey, x509, dgst, attribs, db, 1104 j = certify_cert(&x, ss_cert_file, pkey, x50 1461 certify(X509 **xret, char *infile, EVP_PKEY *pkey, X509 *x509, const EVP_MD *dgst, STACK_OF(CONF_VALUE) *policy, CA_DB *db, BIGNUM *serial, char *subj, unsigned long chtype, int multirdn, int email_dn, char *startdate, char *enddate, long days, int batch, char *ext_sect, CONF *lconf, int verbose, unsigned long certopt, unsigned long nameopt, int default_op, int ext_copy, int selfsign) argument 1531 certify_cert(X509 **xret, char *infile, EVP_PKEY *pkey, X509 *x509, const EVP_MD *dgst, STACK_OF(CONF_VALUE) *policy, CA_DB *db, BIGNUM *serial, char *subj, unsigned long chtype, int multirdn, int email_dn, char *startdate, char *enddate, long days, int batch, char *ext_sect, CONF *lconf, int verbose, unsigned long certopt, unsigned long nameopt, int default_op, int ext_copy, ENGINE *e) argument 1587 do_body(X509 **xret, EVP_PKEY *pkey, X509 *x509, const EVP_MD *dgst, STACK_OF(CONF_VALUE) *policy, CA_DB *db, BIGNUM *serial, char *subj, unsigned long chtype, int multirdn, int email_dn, char *startdate, char *enddate, long days, int batch, int verbose, X509_REQ *req, char *ext_sect, CONF *lconf, unsigned long certopt, unsigned long nameopt, int default_op, int ext_copy, int selfsign) argument 2159 certify_spkac(X509 **xret, char *infile, EVP_PKEY *pkey, X509 *x509, const EVP_MD *dgst, STACK_OF(CONF_VALUE) *policy, CA_DB *db, BIGNUM *serial, char *subj, unsigned long chtype, int multirdn, int email_dn, char *startdate, char *enddate, long days, char *ext_sect, CONF *lconf, int verbose, unsigned long certopt, unsigned long nameopt, int default_op, int ext_copy) argument [all...] |
/freebsd-9.3-release/contrib/wpa/src/tls/ |
H A D | tlsv1_cred.c | 223 struct crypto_private_key *pkey; local 244 pkey = crypto_private_key_import(der, der_len, NULL); 246 return pkey; 257 struct crypto_private_key *pkey; local 272 pkey = crypto_private_key_import(der, der_len, passwd); 274 return pkey;
|
/freebsd-9.3-release/crypto/openssl/crypto/pkcs7/ |
H A D | pkcs7.h | 100 EVP_PKEY *pkey; member in struct:pkcs7_signer_info_st 300 int PKCS7_SIGNER_INFO_set(PKCS7_SIGNER_INFO *p7i, X509 *x509, EVP_PKEY *pkey, 313 BIO *PKCS7_dataDecode(PKCS7 *p7, EVP_PKEY *pkey, BIO *in_bio, X509 *pcert); 316 EVP_PKEY *pkey, const EVP_MD *dgst); 339 PKCS7 *PKCS7_sign(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs, 347 int PKCS7_decrypt(PKCS7 *p7, EVP_PKEY *pkey, X509 *cert, BIO *data,
|
H A D | pk7_smime.c | 67 PKCS7 *PKCS7_sign(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs, argument 76 if (!X509_check_private_key(signcert, pkey)) { 93 if (!(si = PKCS7_add_signature(p7, signcert, pkey, EVP_sha1()))) { 450 int PKCS7_decrypt(PKCS7 *p7, EVP_PKEY *pkey, X509 *cert, BIO *data, int flags) argument 466 if (cert && !X509_check_private_key(cert, pkey)) { 472 if (!(tmpmem = PKCS7_dataDecode(p7, pkey, NULL, cert))) {
|
/freebsd-9.3-release/contrib/wpa/src/crypto/ |
H A D | crypto_gnutls.c | 42 u8 pkey[8], next, tmp; local 49 pkey[i] = (tmp >> i) | next | 1; 52 pkey[i] = next | 1; 55 gcry_err_code(gcry_cipher_setkey(hd, pkey, 8));
|
/freebsd-9.3-release/crypto/openssl/crypto/pem/ |
H A D | pem_info.c | 177 pp = &(xi->x_pkey->dec_pkey->pkey.rsa); 200 pp = &xi->x_pkey->dec_pkey->pkey.dsa; 223 pp = &(xi->x_pkey->dec_pkey->pkey.ec); 360 xi->x_pkey->dec_pkey->pkey.rsa,
|
/freebsd-9.3-release/sys/contrib/rdma/ |
H A D | ib_sa.h | 149 __be16 pkey; member in struct:ib_sa_path_rec 188 __be16 pkey; member in struct:ib_sa_mcmember_rec 245 __be16 pkey; member in struct:ib_sa_service_rec
|
/freebsd-9.3-release/sys/ofed/include/rdma/ |
H A D | ib_addr.h | 117 static inline void ib_addr_set_pkey(struct rdma_dev_addr *dev_addr, u16 pkey) argument 119 dev_addr->broadcast[8] = pkey >> 8; 120 dev_addr->broadcast[9] = (unsigned char) pkey;
|
/freebsd-9.3-release/contrib/ntp/ntpd/ |
H A D | ntp_crypto.c | 675 if (peer->pkey == NULL) { 679 peer->pkey = X509_get_pubkey(cert); 1427 EVP_PKEY *pkey; /* server public key */ local 1526 pkey = sign_pkey; 1528 pkey = peer->pkey; 1529 if (siglen == 0 || pkey == NULL || peer->digest == NULL) 1532 if (siglen != (u_int)EVP_PKEY_size(pkey)) 1545 pkey) <= 0) { 1574 EVP_PKEY *pkey; /* publi local 3142 EVP_PKEY *pkey; /* public key */ local 3656 EVP_PKEY *pkey = NULL; /* public/private key */ local [all...] |