/freebsd-current/crypto/openssl/crypto/evp/ |
H A D | p_lib.c | 507 const unsigned char *pub, size_t len) 509 return new_raw_key_int(libctx, keytype, propq, EVP_PKEY_NONE, NULL, pub, 514 const unsigned char *pub, 517 return new_raw_key_int(NULL, NULL, NULL, type, e, pub, len, 0); 582 int EVP_PKEY_get_raw_public_key(const EVP_PKEY *pkey, unsigned char *pub, argument 588 raw_key.key = pub == NULL ? NULL : &pub; 606 if (!pkey->ameth->get_pub_key(pkey, pub, len)) { 1379 int EVP_PKEY_set1_encoded_public_key(EVP_PKEY *pkey, const unsigned char *pub, argument 1388 (unsigned char *)pub, puble 505 EVP_PKEY_new_raw_public_key_ex(OSSL_LIB_CTX *libctx, const char *keytype, const char *propq, const unsigned char *pub, size_t len) argument 513 EVP_PKEY_new_raw_public_key(int type, ENGINE *e, const unsigned char *pub, size_t len) argument [all...] |
/freebsd-current/contrib/ncurses/ |
H A D | Makefile.os2 | 110 $(WWWGET) ftp://ftp.math.ohio-state.edu/pub/users/ilya/os2/$@ > $@
|
/freebsd-current/crypto/openssh/regress/ |
H A D | krl.sh | 90 RKEYS="$RKEYS ${f}.pub" 91 RCERTS="$RCERTS ${f}-cert.pub" 97 UKEYS="$UKEYS ${f}.pub" 98 UCERTS="$UCERTS ${f}-cert.pub" 120 $SSHKEYGEN $OPTS -kf $OBJ/krl-ca $OBJ/revoked-ca.pub \ 136 $SSHKEYGEN $OPTS -kf $OBJ/krl-keyid -s $OBJ/revoked-ca.pub \
|
H A D | keygen-knownhosts.sh | 24 cat $OBJ/kh.${x}.pub 51 cat $OBJ/kh.${_key}.pub >> $OBJ/kh.expect || 52 fatal "${_key}.pub missing"
|
/freebsd-current/crypto/openssl/providers/implementations/keymgmt/ |
H A D | ecx_kmgmt.c | 724 uint8_t pub[64]; local 728 ossl_x25519_public_from_private(pub, ecx->privkey); 731 ossl_x448_public_from_private(pub, ecx->privkey); 734 if (!ossl_ed25519_public_from_private(ecx->libctx, pub, ecx->privkey, 739 if (!ossl_ed448_public_from_private(ecx->libctx, pub, ecx->privkey, 746 return CRYPTO_memcmp(ecx->pubkey, pub, ecx->keylen) == 0;
|
/freebsd-current/crypto/openssl/test/ |
H A D | evp_pkey_provided_test.c | 80 suffix = "pub.txt"; 84 suffix = "pub.pem"; 88 suffix = "pub.der"; 508 BIGNUM *pub = NULL, *priv = NULL; local 554 || !TEST_ptr(pub = BN_bin2bn(pub_data, sizeof(pub_data), NULL)) 561 || !TEST_true(OSSL_PARAM_BLD_push_BN(bld, OSSL_PKEY_PARAM_PUB_KEY, pub)) 622 || !TEST_BN_eq(pub, pub_out) 698 BN_free(pub); 719 BIGNUM *pub = NULL, *priv = NULL; local 766 || !TEST_ptr(pub 1431 BIGNUM *pub = NULL, *priv = NULL; local [all...] |
H A D | dhtest.c | 266 BIGNUM *p = NULL, *q = NULL, *g = NULL, *pub = NULL, *priv = NULL; local 279 || !TEST_ptr(pub = BN_new()) 287 if (!TEST_true(BN_set_word(pub, 1))) 290 /* Given z = pub ^ priv mod p */ 293 if (!TEST_int_le(ossl_dh_compute_key(buf, pub, dh), 0)) 296 if (!TEST_ptr(BN_copy(pub, DH_get0_p(dh))) 297 || !TEST_int_le(ossl_dh_compute_key(buf, pub, dh), 0)) 300 if (!TEST_true(BN_sub_word(pub, 1)) 301 || !TEST_int_le(ossl_dh_compute_key(buf, pub, dh), 0)) 304 if (!TEST_true(BN_sub_word(pub, [all...] |
H A D | evp_extra_test.c | 592 /* group is also associated in our pub key */ 780 BIGNUM *p = NULL, *q = NULL, *g = NULL, *pub = NULL, *priv = NULL; local 790 || !TEST_ptr(pub = BN_new()) 794 /* Test !priv and !pub */ 813 /* Test priv and !pub */ 834 /* Test !priv and pub */ 840 pub))) 855 /* Test priv and pub */ 861 pub)) 883 BN_free(pub); 2218 char *pub; member in struct:keys_st 2253 test_set_get_raw_keys_int(int tst, int pub, int uselibctx) argument 2767 BIGNUM *p = NULL, *q = NULL, *g = NULL, *pub = NULL, *priv = NULL; local 3049 unsigned char pub[2048 / 8]; local [all...] |
/freebsd-current/crypto/openssl/engines/ |
H A D | e_ossltest.c | 376 static EVP_PKEY *load_key(ENGINE *eng, const char *key_id, int pub, argument 387 pub ? "Public" : "Private", key_id); 391 if (pub)
|
/freebsd-current/contrib/wpa/src/crypto/ |
H A D | crypto_openssl.c | 625 BIGNUM *pub, *p; local 628 pub = BN_bin2bn(pubkey, pubkey_len, NULL); 630 if (!pub || !p || BN_is_zero(pub) || BN_is_one(pub) || 631 BN_cmp(pub, p) >= 0) 644 !BN_mod_exp(tmp, pub, q, p, ctx) || 656 BN_clear_free(pub); 2189 EC_POINT *pub; local 2193 pub 2420 crypto_ec_key_set_pub_point(struct crypto_ec *ec, const struct crypto_ec_point *pub) argument [all...] |
H A D | crypto.h | 1038 * @pub: Public key point 1043 const struct crypto_ec_point *pub);
|
/freebsd-current/contrib/libfido2/fuzz/ |
H A D | wrap.c | 139 (const EVP_PKEY *pkey, unsigned char *pub, size_t *len), 141 (pkey, pub, len),
|
/freebsd-current/tools/tools/makeroot/ |
H A D | makeroot.sh | 217 cat ${KEYDIR}/*.pub > ${tmpdir}/authorized_keys
|
/freebsd-current/contrib/llvm-project/lld/COFF/ |
H A D | PDB.cpp | 1129 pdb::BulkPublic pub; local 1130 pub.Name = def->getName().data(); 1131 pub.NameLen = def->getName().size(); 1140 pub.setFlags(flags); 1144 pub.Offset = def->getRVA() - os->getRVA(); 1145 pub.Segment = os->sectionIndex; 1146 return pub;
|
/freebsd-current/crypto/openssl/crypto/ec/ |
H A D | ec_asn1.c | 1024 unsigned char *priv= NULL, *pub= NULL; local 1068 publen = EC_KEY_key2buf(a, a->conv_form, &pub, NULL); 1077 ASN1_STRING_set0(priv_key->publicKey, pub, publen); 1078 pub = NULL; 1088 OPENSSL_free(pub);
|
/freebsd-current/crypto/openssl/include/openssl/ |
H A D | evp.h | 1454 const unsigned char *pub, size_t publen); 1582 const X509_PUBKEY *pub), 1583 int (*pub_encode) (X509_PUBKEY *pub, 1658 const unsigned char *pub, 1666 unsigned char *pub, 1817 const unsigned char *pub, size_t len); 1819 const unsigned char *pub, 1823 int EVP_PKEY_get_raw_public_key(const EVP_PKEY *pkey, unsigned char *pub,
|
/freebsd-current/crypto/openssh/.github/ |
H A D | setup_ci.sh | 225 LIBRESSL_URLBASE=https://cdn.openbsd.org/pub/OpenBSD/LibreSSL
|
/freebsd-current/usr.sbin/freebsd-update/ |
H A D | freebsd-update.sh | 1278 if [ -r pub.ssl ] && [ `${SHA256} -q pub.ssl` = ${KEYPRINT} ]; then 1283 rm -f pub.ssl 1284 fetch ${QUIETFLAG} http://${SERVERNAME}/${FETCHDIR}/pub.ssl \ 1286 if ! [ -r pub.ssl ]; then 1290 if ! [ `${SHA256} -q pub.ssl` = ${KEYPRINT} ]; then 1292 rm -f pub.ssl 1310 openssl rsautl -pubin -inkey pub.ssl -verify \
|
/freebsd-current/contrib/wpa/src/ap/ |
H A D | sta_info.h | 295 u16 resp, struct wpabuf *data, int pub);
|
H A D | ieee802_11.h | 184 u16 resp, struct wpabuf *data, int pub));
|
/freebsd-current/contrib/unbound/validator/ |
H A D | val_secalgo.c | 1062 SECItem pub = {siBuffer, NULL, 0}; local 1087 pub.data = buf; 1088 pub.len = len+1; 1101 if(SECITEM_CopyItem(pk->arena, &pk->u.ec.publicValue, &pub)) {
|
/freebsd-current/contrib/wpa/src/eap_peer/ |
H A D | eap_eke.c | 364 u8 pub[EAP_EKE_MAX_DH_LEN]; local 415 if (eap_eke_dh_init(data->sess.dhgroup, data->dh_priv, pub) < 0) { 452 if (eap_eke_dhcomp(&data->sess, key, pub, rpos) < 0) {
|
/freebsd-current/contrib/wpa/src/eap_server/ |
H A D | eap_server_eke.c | 243 u8 pub[EAP_EKE_MAX_DH_LEN]; local 277 if (eap_eke_dh_init(data->sess.dhgroup, data->dh_priv, pub) < 0) { 283 if (eap_eke_dhcomp(&data->sess, data->key, pub,
|
/freebsd-current/contrib/wpa/src/common/ |
H A D | dpp_crypto.c | 665 static int dpp_check_pubkey_match(struct crypto_ec_key *pub, argument 676 uncomp = crypto_ec_key_get_pubkey_point(pub, 1); 1976 struct wpabuf *pub = NULL; local 1996 pub = crypto_ecdh_get_pubkey(pfs->ecdh, 0); 1997 pub = wpabuf_zeropad(pub, pfs->curve->prime_len); 1998 if (!pub) 2001 pfs->ie = wpabuf_alloc(5 + wpabuf_len(pub)); 2005 wpabuf_put_u8(pfs->ie, 1 + 2 + wpabuf_len(pub)); 2008 wpabuf_put_buf(pfs->ie, pub); [all...] |
/freebsd-current/crypto/openssl/apps/ |
H A D | testdsa.h | 191 unsigned char *pub; member in struct:testdsa_st 205 st.pub = dsa##bits##_pub; \ 243 pub_key = BN_bin2bn(dsa_t.pub, dsa_t.pub_l, NULL);
|