Searched refs:pubkey (Results 26 - 50 of 58) sorted by relevance

123

/macosx-10.10/curl-83.1.2/curl/src/
H A Dtool_cfgable.h116 char *pubkey; member in struct:OperationConfig
H A Dtool_cfgable.c107 Curl_safefree(config->pubkey);
/macosx-10.10/Security-57031.1.35/Security/sec/SOSCircle/SecureObjectSync/
H A DSOSCircle.h53 bool SOSCircleVerify(SOSCircleRef circle, SecKeyRef pubkey, CFErrorRef *error);
89 int SOSCircleCountActiveValidPeers(SOSCircleRef circle, SecKeyRef pubkey);
H A DSOSCircle.c234 static bool SOSCircleSetSignature(SOSCircleRef circle, SecKeyRef pubkey, CFDataRef signature, CFErrorRef *error) { argument
237 CFStringRef pubKeyID = SOSCopyIDOfKey(pubkey, error);
252 static CFDataRef SOSCircleGetSignature(SOSCircleRef circle, SecKeyRef pubkey, CFErrorRef *error) { argument
253 CFStringRef pubKeyID = SOSCopyIDOfKey(pubkey, error);
335 static void SOSCircleRejectNonValidApplicants(SOSCircleRef circle, SecKeyRef pubkey) { argument
339 if(!SOSPeerInfoApplicationVerify(pi, pubkey, NULL)) {
484 __unused static inline bool SOSCircleIsResignOffering(SOSCircleRef circle, SecKeyRef pubkey) { argument
485 return SOSCircleCountActiveValidPeers(circle, pubkey) == 1;
835 int SOSCircleCountActiveValidPeers(SOSCircleRef circle, SecKeyRef pubkey) { argument
838 SOSCircleForEachActiveValidPeer(circle, pubkey,
[all...]
H A DSOSPeerInfo.c145 static bool sosVerifyHash(SecKeyRef pubkey, const struct ccdigest_info *di, uint8_t *hbuf, CFDataRef signature) { argument
146 return SecKeyRawVerify(pubkey, kSecPaddingNone, hbuf, di->output_size,
/macosx-10.10/ntp-92/ntpd/
H A Dntp_crypto.c129 struct value pubkey; /* public key */ variable in typeref:struct:value
1301 len = crypto_send(fp, &pubkey, start);
1778 * pubkey public key
1807 if (pubkey.vallen != 0) {
1808 pubkey.tstamp = hostval.tstamp;
1809 pubkey.siglen = 0;
1810 if (pubkey.sig == NULL)
1811 pubkey.sig = emalloc(sign_siglen);
1813 EVP_SignUpdate(&ctx, (u_char *)&pubkey, 12);
1814 EVP_SignUpdate(&ctx, pubkey
[all...]
/macosx-10.10/OpenSSL098-52/src/apps/
H A Dx509.c112 " -pubkey - output the public key\n",
186 int x509req=0,days=DEF_DAYS,modulus=0,pubkey=0; local
391 else if (strcmp(*argv,"-pubkey") == 0)
392 pubkey= ++num;
577 (req->req_info->pubkey == NULL) ||
578 (req->req_info->pubkey->public_key == NULL) ||
579 (req->req_info->pubkey->public_key->data == NULL))
802 if (pubkey == i)
H A Dreq.c122 * -pubkey - output Public Key.
180 int nodes=0,kludge=0,newhdr=0,subject=0,pubkey=0; local
245 else if (strcmp(*argv,"-pubkey") == 0)
247 pubkey=1;
505 BIO_printf(bio_err," -pubkey output public key\n");
1054 if (noout && !text && !modulus && !subject && !pubkey)
1083 if (pubkey)
/macosx-10.10/bind9-45.101/bind9/contrib/zkt/
H A Ddki.c156 dkp->pubkey = strdup (p);
192 if ( dkp->pubkey )
193 free (dkp->pubkey);
700 for ( p = dkp->pubkey; *p ; p++ )
739 fprintf (fp, "%s\n", dkp->pubkey);
779 for ( p = dkp->pubkey; *p ; p++ )
H A Ddki.h118 char *pubkey; /* base64 public key */ member in struct:dki
/macosx-10.10/bind9-45.101/bind9/lib/dns/
H A Dtkey.c280 dst_key_t *pubkey = NULL; local
320 pubkey = NULL;
322 msg->mctx, &pubkey);
327 if (dst_key_alg(pubkey) == DNS_KEYALG_DH) {
328 if (dst_key_paramcompare(pubkey, tctx->dhkey))
336 dst_key_free(&pubkey);
371 result = dst_key_computesecret(pubkey, tctx->dhkey, shared);
377 dst_key_free(&pubkey);
420 if (pubkey != NULL)
421 dst_key_free(&pubkey);
[all...]
/macosx-10.10/curl-83.1.2/curl/lib/vtls/
H A Dopenssl.c2075 if(pubkey->pkey._type->_name != NULL) { \
2076 int len = BN_num_bytes(pubkey->pkey._type->_name); \
2078 BN_bn2bin(pubkey->pkey._type->_name, (unsigned char*)bufp); \
2225 EVP_PKEY *pubkey=NULL; local
2295 pubkey = X509_get_pubkey(x);
2296 if(!pubkey)
2299 switch(pubkey->type) {
2302 BN_num_bits(pubkey->pkey.rsa->n));
2303 snprintf(bufp, CERTBUFFERSIZE, "%d", BN_num_bits(pubkey->pkey.rsa->n));
2334 EVP_PKEY_free(pubkey);
[all...]
/macosx-10.10/OpenSSL098-52/src/engines/
H A De_capi.c589 unsigned char *pubkey = NULL; local
602 pubkey = OPENSSL_malloc(len);
604 if (!pubkey)
607 if (!CryptExportKey(key->key, 0, PUBLICKEYBLOB, 0, pubkey, &len))
614 bh = (BLOBHEADER *)pubkey;
718 if (pubkey)
719 OPENSSL_free(pubkey);
/macosx-10.10/Security-57031.1.35/Security/include/security_keychain/
H A DSecKey.cpp2159 ccrsa_pub_ctx_t pubkey; local
2160 pubkey.pub = key->key;
2162 size_t m_size = ccn_write_uint_size(ccrsa_ctx_n(pubkey), ccrsa_ctx_m(pubkey));
2172 ccn_write_uint(ccrsa_ctx_n(pubkey), ccrsa_ctx_m(pubkey), m_size, CFDataGetMutableBytePtr(modulusData));
2187 ccrsa_pub_ctx_t pubkey; local
2188 pubkey.pub = key->key;
2190 size_t e_size = ccn_write_uint_size(ccrsa_ctx_n(pubkey), ccrsa_ctx_e(pubkey));
[all...]
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/Security/
H A DSecKey.cpp2159 ccrsa_pub_ctx_t pubkey; local
2160 pubkey.pub = key->key;
2162 size_t m_size = ccn_write_uint_size(ccrsa_ctx_n(pubkey), ccrsa_ctx_m(pubkey));
2172 ccn_write_uint(ccrsa_ctx_n(pubkey), ccrsa_ctx_m(pubkey), m_size, CFDataGetMutableBytePtr(modulusData));
2187 ccrsa_pub_ctx_t pubkey; local
2188 pubkey.pub = key->key;
2190 size_t e_size = ccn_write_uint_size(ccrsa_ctx_n(pubkey), ccrsa_ctx_e(pubkey));
[all...]
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/lib/
H A DSecKey.cpp2159 ccrsa_pub_ctx_t pubkey; local
2160 pubkey.pub = key->key;
2162 size_t m_size = ccn_write_uint_size(ccrsa_ctx_n(pubkey), ccrsa_ctx_m(pubkey));
2172 ccn_write_uint(ccrsa_ctx_n(pubkey), ccrsa_ctx_m(pubkey), m_size, CFDataGetMutableBytePtr(modulusData));
2187 ccrsa_pub_ctx_t pubkey; local
2188 pubkey.pub = key->key;
2190 size_t e_size = ccn_write_uint_size(ccrsa_ctx_n(pubkey), ccrsa_ctx_e(pubkey));
[all...]
/macosx-10.10/OpenSSL098-52/src/crypto/asn1/
H A Dx_pubkey.c75 X509_PUBKEY *pubkey = (X509_PUBKEY *)*pval; local
76 EVP_PKEY_free(pubkey->pkey);
H A Dt_req.c140 if (i2a_ASN1_OBJECT(bp, ri->pubkey->algor->algorithm) <= 0)
/macosx-10.10/OpenSSL098-52/src/crypto/x509/
H A Dx509_req.c113 return(X509_PUBKEY_get(req->req_info->pubkey));
H A Dx509.h234 X509_PUBKEY *pubkey; member in struct:X509_req_info_st
507 X509_PUBKEY *pubkey; member in struct:Netscape_spkac_st
1017 int X509_certificate_type(X509 *x,EVP_PKEY *pubkey /* optional */);
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/servers/slapd/overlays/
H A Dodusers.c1529 /* Returns a newly allocated copy of the pws pubkey attribute.
1893 char *pubkey = NULL; local
1913 pubkey = odusers_copy_pwspubkey(op);
1914 if(!pubkey) {
1937 if(pubkey[strlen(pubkey)-1] == '\n') {
1938 pubkey[strlen(pubkey)-1] = '\0'; // strip of trailing newline
1942 asprintf(&pws_authAuthority, ";ApplePasswordServer;%s,%s:%s", slotid, pubkey, primary_master_ip);
1984 ch_free(pubkey);
[all...]
/macosx-10.10/OpenSSH-189/openssh/
H A Dssh-keygen.c575 EVP_PKEY *pubkey; local
580 if ((pubkey = PEM_read_PUBKEY(fp, NULL, NULL, NULL)) == NULL) {
585 switch (EVP_PKEY_type(pubkey->type)) {
589 (*k)->rsa = EVP_PKEY_get1_RSA(pubkey);
594 (*k)->dsa = EVP_PKEY_get1_DSA(pubkey);
600 (*k)->ecdsa = EVP_PKEY_get1_EC_KEY(pubkey);
605 fatal("%s: unsupported pubkey type %d", __func__,
606 EVP_PKEY_type(pubkey->type));
608 EVP_PKEY_free(pubkey);
/macosx-10.10/vim-55/runtime/syntax/
H A Dgpg.vim47 \ disable-pubkey-algo encrypt-to exec-path
/macosx-10.10/curl-83.1.2/curl/lib/
H A Dx509asn1.c800 curl_asn1Element * pubkey)
812 Curl_getASN1Element(&pk, pubkey->beg + 1, pubkey->end);
798 do_pubkey(struct SessionHandle * data, int certnum, const char * algo, curl_asn1Element * param, curl_asn1Element * pubkey) argument
/macosx-10.10/Security-57031.1.35/Security/sec/Security/Regressions/secitem/
H A Dsi-61-pkcs12.c613 SecKeyRef pubkey = NULL; local
616 ok(pubkey = SecKeyCreateECPublicKey(kCFAllocatorDefault,
626 ok_status(SecKeyRawVerify(pubkey, kSecPaddingPKCS1,
631 CFReleaseNull(pubkey);
638 ok(pubkey = SecKeyCreateECPublicKey(kCFAllocatorDefault,
641 ok_status(SecKeyRawVerify(pubkey, kSecPaddingPKCS1,
645 CFReleaseNull(pubkey);

Completed in 454 milliseconds

123