/macosx-10.10/curl-83.1.2/curl/src/ |
H A D | tool_cfgable.h | 116 char *pubkey; member in struct:OperationConfig
|
H A D | tool_cfgable.c | 107 Curl_safefree(config->pubkey);
|
/macosx-10.10/Security-57031.1.35/Security/sec/SOSCircle/SecureObjectSync/ |
H A D | SOSCircle.h | 53 bool SOSCircleVerify(SOSCircleRef circle, SecKeyRef pubkey, CFErrorRef *error); 89 int SOSCircleCountActiveValidPeers(SOSCircleRef circle, SecKeyRef pubkey);
|
H A D | SOSCircle.c | 234 static bool SOSCircleSetSignature(SOSCircleRef circle, SecKeyRef pubkey, CFDataRef signature, CFErrorRef *error) { argument 237 CFStringRef pubKeyID = SOSCopyIDOfKey(pubkey, error); 252 static CFDataRef SOSCircleGetSignature(SOSCircleRef circle, SecKeyRef pubkey, CFErrorRef *error) { argument 253 CFStringRef pubKeyID = SOSCopyIDOfKey(pubkey, error); 335 static void SOSCircleRejectNonValidApplicants(SOSCircleRef circle, SecKeyRef pubkey) { argument 339 if(!SOSPeerInfoApplicationVerify(pi, pubkey, NULL)) { 484 __unused static inline bool SOSCircleIsResignOffering(SOSCircleRef circle, SecKeyRef pubkey) { argument 485 return SOSCircleCountActiveValidPeers(circle, pubkey) == 1; 835 int SOSCircleCountActiveValidPeers(SOSCircleRef circle, SecKeyRef pubkey) { argument 838 SOSCircleForEachActiveValidPeer(circle, pubkey, [all...] |
H A D | SOSPeerInfo.c | 145 static bool sosVerifyHash(SecKeyRef pubkey, const struct ccdigest_info *di, uint8_t *hbuf, CFDataRef signature) { argument 146 return SecKeyRawVerify(pubkey, kSecPaddingNone, hbuf, di->output_size,
|
/macosx-10.10/ntp-92/ntpd/ |
H A D | ntp_crypto.c | 129 struct value pubkey; /* public key */ variable in typeref:struct:value 1301 len = crypto_send(fp, &pubkey, start); 1778 * pubkey public key 1807 if (pubkey.vallen != 0) { 1808 pubkey.tstamp = hostval.tstamp; 1809 pubkey.siglen = 0; 1810 if (pubkey.sig == NULL) 1811 pubkey.sig = emalloc(sign_siglen); 1813 EVP_SignUpdate(&ctx, (u_char *)&pubkey, 12); 1814 EVP_SignUpdate(&ctx, pubkey [all...] |
/macosx-10.10/OpenSSL098-52/src/apps/ |
H A D | x509.c | 112 " -pubkey - output the public key\n", 186 int x509req=0,days=DEF_DAYS,modulus=0,pubkey=0; local 391 else if (strcmp(*argv,"-pubkey") == 0) 392 pubkey= ++num; 577 (req->req_info->pubkey == NULL) || 578 (req->req_info->pubkey->public_key == NULL) || 579 (req->req_info->pubkey->public_key->data == NULL)) 802 if (pubkey == i)
|
H A D | req.c | 122 * -pubkey - output Public Key. 180 int nodes=0,kludge=0,newhdr=0,subject=0,pubkey=0; local 245 else if (strcmp(*argv,"-pubkey") == 0) 247 pubkey=1; 505 BIO_printf(bio_err," -pubkey output public key\n"); 1054 if (noout && !text && !modulus && !subject && !pubkey) 1083 if (pubkey)
|
/macosx-10.10/bind9-45.101/bind9/contrib/zkt/ |
H A D | dki.c | 156 dkp->pubkey = strdup (p); 192 if ( dkp->pubkey ) 193 free (dkp->pubkey); 700 for ( p = dkp->pubkey; *p ; p++ ) 739 fprintf (fp, "%s\n", dkp->pubkey); 779 for ( p = dkp->pubkey; *p ; p++ )
|
H A D | dki.h | 118 char *pubkey; /* base64 public key */ member in struct:dki
|
/macosx-10.10/bind9-45.101/bind9/lib/dns/ |
H A D | tkey.c | 280 dst_key_t *pubkey = NULL; local 320 pubkey = NULL; 322 msg->mctx, &pubkey); 327 if (dst_key_alg(pubkey) == DNS_KEYALG_DH) { 328 if (dst_key_paramcompare(pubkey, tctx->dhkey)) 336 dst_key_free(&pubkey); 371 result = dst_key_computesecret(pubkey, tctx->dhkey, shared); 377 dst_key_free(&pubkey); 420 if (pubkey != NULL) 421 dst_key_free(&pubkey); [all...] |
/macosx-10.10/curl-83.1.2/curl/lib/vtls/ |
H A D | openssl.c | 2075 if(pubkey->pkey._type->_name != NULL) { \ 2076 int len = BN_num_bytes(pubkey->pkey._type->_name); \ 2078 BN_bn2bin(pubkey->pkey._type->_name, (unsigned char*)bufp); \ 2225 EVP_PKEY *pubkey=NULL; local 2295 pubkey = X509_get_pubkey(x); 2296 if(!pubkey) 2299 switch(pubkey->type) { 2302 BN_num_bits(pubkey->pkey.rsa->n)); 2303 snprintf(bufp, CERTBUFFERSIZE, "%d", BN_num_bits(pubkey->pkey.rsa->n)); 2334 EVP_PKEY_free(pubkey); [all...] |
/macosx-10.10/OpenSSL098-52/src/engines/ |
H A D | e_capi.c | 589 unsigned char *pubkey = NULL; local 602 pubkey = OPENSSL_malloc(len); 604 if (!pubkey) 607 if (!CryptExportKey(key->key, 0, PUBLICKEYBLOB, 0, pubkey, &len)) 614 bh = (BLOBHEADER *)pubkey; 718 if (pubkey) 719 OPENSSL_free(pubkey);
|
/macosx-10.10/Security-57031.1.35/Security/include/security_keychain/ |
H A D | SecKey.cpp | 2159 ccrsa_pub_ctx_t pubkey; local 2160 pubkey.pub = key->key; 2162 size_t m_size = ccn_write_uint_size(ccrsa_ctx_n(pubkey), ccrsa_ctx_m(pubkey)); 2172 ccn_write_uint(ccrsa_ctx_n(pubkey), ccrsa_ctx_m(pubkey), m_size, CFDataGetMutableBytePtr(modulusData)); 2187 ccrsa_pub_ctx_t pubkey; local 2188 pubkey.pub = key->key; 2190 size_t e_size = ccn_write_uint_size(ccrsa_ctx_n(pubkey), ccrsa_ctx_e(pubkey)); [all...] |
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/Security/ |
H A D | SecKey.cpp | 2159 ccrsa_pub_ctx_t pubkey; local 2160 pubkey.pub = key->key; 2162 size_t m_size = ccn_write_uint_size(ccrsa_ctx_n(pubkey), ccrsa_ctx_m(pubkey)); 2172 ccn_write_uint(ccrsa_ctx_n(pubkey), ccrsa_ctx_m(pubkey), m_size, CFDataGetMutableBytePtr(modulusData)); 2187 ccrsa_pub_ctx_t pubkey; local 2188 pubkey.pub = key->key; 2190 size_t e_size = ccn_write_uint_size(ccrsa_ctx_n(pubkey), ccrsa_ctx_e(pubkey)); [all...] |
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/lib/ |
H A D | SecKey.cpp | 2159 ccrsa_pub_ctx_t pubkey; local 2160 pubkey.pub = key->key; 2162 size_t m_size = ccn_write_uint_size(ccrsa_ctx_n(pubkey), ccrsa_ctx_m(pubkey)); 2172 ccn_write_uint(ccrsa_ctx_n(pubkey), ccrsa_ctx_m(pubkey), m_size, CFDataGetMutableBytePtr(modulusData)); 2187 ccrsa_pub_ctx_t pubkey; local 2188 pubkey.pub = key->key; 2190 size_t e_size = ccn_write_uint_size(ccrsa_ctx_n(pubkey), ccrsa_ctx_e(pubkey)); [all...] |
/macosx-10.10/OpenSSL098-52/src/crypto/asn1/ |
H A D | x_pubkey.c | 75 X509_PUBKEY *pubkey = (X509_PUBKEY *)*pval; local 76 EVP_PKEY_free(pubkey->pkey);
|
H A D | t_req.c | 140 if (i2a_ASN1_OBJECT(bp, ri->pubkey->algor->algorithm) <= 0)
|
/macosx-10.10/OpenSSL098-52/src/crypto/x509/ |
H A D | x509_req.c | 113 return(X509_PUBKEY_get(req->req_info->pubkey));
|
H A D | x509.h | 234 X509_PUBKEY *pubkey; member in struct:X509_req_info_st 507 X509_PUBKEY *pubkey; member in struct:Netscape_spkac_st 1017 int X509_certificate_type(X509 *x,EVP_PKEY *pubkey /* optional */);
|
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/servers/slapd/overlays/ |
H A D | odusers.c | 1529 /* Returns a newly allocated copy of the pws pubkey attribute. 1893 char *pubkey = NULL; local 1913 pubkey = odusers_copy_pwspubkey(op); 1914 if(!pubkey) { 1937 if(pubkey[strlen(pubkey)-1] == '\n') { 1938 pubkey[strlen(pubkey)-1] = '\0'; // strip of trailing newline 1942 asprintf(&pws_authAuthority, ";ApplePasswordServer;%s,%s:%s", slotid, pubkey, primary_master_ip); 1984 ch_free(pubkey); [all...] |
/macosx-10.10/OpenSSH-189/openssh/ |
H A D | ssh-keygen.c | 575 EVP_PKEY *pubkey; local 580 if ((pubkey = PEM_read_PUBKEY(fp, NULL, NULL, NULL)) == NULL) { 585 switch (EVP_PKEY_type(pubkey->type)) { 589 (*k)->rsa = EVP_PKEY_get1_RSA(pubkey); 594 (*k)->dsa = EVP_PKEY_get1_DSA(pubkey); 600 (*k)->ecdsa = EVP_PKEY_get1_EC_KEY(pubkey); 605 fatal("%s: unsupported pubkey type %d", __func__, 606 EVP_PKEY_type(pubkey->type)); 608 EVP_PKEY_free(pubkey);
|
/macosx-10.10/vim-55/runtime/syntax/ |
H A D | gpg.vim | 47 \ disable-pubkey-algo encrypt-to exec-path
|
/macosx-10.10/curl-83.1.2/curl/lib/ |
H A D | x509asn1.c | 800 curl_asn1Element * pubkey) 812 Curl_getASN1Element(&pk, pubkey->beg + 1, pubkey->end); 798 do_pubkey(struct SessionHandle * data, int certnum, const char * algo, curl_asn1Element * param, curl_asn1Element * pubkey) argument
|
/macosx-10.10/Security-57031.1.35/Security/sec/Security/Regressions/secitem/ |
H A D | si-61-pkcs12.c | 613 SecKeyRef pubkey = NULL; local 616 ok(pubkey = SecKeyCreateECPublicKey(kCFAllocatorDefault, 626 ok_status(SecKeyRawVerify(pubkey, kSecPaddingPKCS1, 631 CFReleaseNull(pubkey); 638 ok(pubkey = SecKeyCreateECPublicKey(kCFAllocatorDefault, 641 ok_status(SecKeyRawVerify(pubkey, kSecPaddingPKCS1, 645 CFReleaseNull(pubkey);
|