Searched refs:pk (Results 1 - 25 of 80) sorted by relevance

1234

/freebsd-10-stable/crypto/openssl/crypto/dsa/
H A Ddsa_prn.c99 EVP_PKEY *pk; local
101 pk = EVP_PKEY_new();
102 if (!pk || !EVP_PKEY_set1_DSA(pk, (DSA *)x))
104 ret = EVP_PKEY_print_private(bp, pk, off, NULL);
105 EVP_PKEY_free(pk);
111 EVP_PKEY *pk; local
113 pk = EVP_PKEY_new();
114 if (!pk || !EVP_PKEY_set1_DSA(pk, (DS
[all...]
/freebsd-10-stable/crypto/openssl/crypto/rsa/
H A Drsa_prn.c84 EVP_PKEY *pk; local
86 pk = EVP_PKEY_new();
87 if (!pk || !EVP_PKEY_set1_RSA(pk, (RSA *)x))
89 ret = EVP_PKEY_print_private(bp, pk, off, NULL);
90 EVP_PKEY_free(pk);
/freebsd-10-stable/crypto/openssl/crypto/asn1/
H A Dasn1_locl.h80 int (*pub_decode) (EVP_PKEY *pk, X509_PUBKEY *pub);
81 int (*pub_encode) (X509_PUBKEY *pub, const EVP_PKEY *pk);
85 int (*priv_decode) (EVP_PKEY *pk, PKCS8_PRIV_KEY_INFO *p8inf);
86 int (*priv_encode) (PKCS8_PRIV_KEY_INFO *p8, const EVP_PKEY *pk);
89 int (*pkey_size) (const EVP_PKEY *pk);
90 int (*pkey_bits) (const EVP_PKEY *pk);
94 int (*param_missing) (const EVP_PKEY *pk);
131 int (*crl_verify) (X509_CRL *crl, EVP_PKEY *pk);
H A Dp8_pkey.c123 const unsigned char **pk, int *ppklen,
130 if (pk) {
131 *pk = p8->pkey->value.octet_string->data;
136 if (pk) {
137 *pk = p8->pkey->value.sequence->data;
H A Dx_pubkey.c91 X509_PUBKEY *pk = NULL;
96 if ((pk = X509_PUBKEY_new()) == NULL)
101 if (!pkey->ameth->pub_encode(pk, pkey)) {
118 *x = pk;
122 if (pk != NULL)
123 X509_PUBKEY_free(pk);
362 const unsigned char **pk, int *ppklen,
367 if (pk) {
368 *pk = pub->public_key->data;
H A Dameth_lib.c392 int (*pub_decode) (EVP_PKEY *pk,
395 const EVP_PKEY *pk),
401 int (*pkey_size) (const EVP_PKEY *pk),
402 int (*pkey_bits) (const EVP_PKEY *pk))
413 int (*priv_decode) (EVP_PKEY *pk,
417 const EVP_PKEY *pk),
434 int (*param_missing) (const EVP_PKEY *pk),
391 EVP_PKEY_asn1_set_public(EVP_PKEY_ASN1_METHOD *ameth, int (*pub_decode) (EVP_PKEY *pk, X509_PUBKEY *pub), int (*pub_encode) (X509_PUBKEY *pub, const EVP_PKEY *pk), int (*pub_cmp) (const EVP_PKEY *a, const EVP_PKEY *b), int (*pub_print) (BIO *out, const EVP_PKEY *pkey, int indent, ASN1_PCTX *pctx), int (*pkey_size) (const EVP_PKEY *pk), int (*pkey_bits) (const EVP_PKEY *pk)) argument
412 EVP_PKEY_asn1_set_private(EVP_PKEY_ASN1_METHOD *ameth, int (*priv_decode) (EVP_PKEY *pk, PKCS8_PRIV_KEY_INFO *p8inf), int (*priv_encode) (PKCS8_PRIV_KEY_INFO *p8, const EVP_PKEY *pk), int (*priv_print) (BIO *out, const EVP_PKEY *pkey, int indent, ASN1_PCTX *pctx)) argument
428 EVP_PKEY_asn1_set_param(EVP_PKEY_ASN1_METHOD *ameth, int (*param_decode) (EVP_PKEY *pkey, const unsigned char **pder, int derlen), int (*param_encode) (const EVP_PKEY *pkey, unsigned char **pder), int (*param_missing) (const EVP_PKEY *pk), int (*param_copy) (EVP_PKEY *to, const EVP_PKEY *from), int (*param_cmp) (const EVP_PKEY *a, const EVP_PKEY *b), int (*param_print) (BIO *out, const EVP_PKEY *pkey, int indent, ASN1_PCTX *pctx)) argument
/freebsd-10-stable/crypto/openssl/crypto/x509/
H A Dx509type.c67 EVP_PKEY *pk; local
74 pk = X509_get_pubkey(x);
76 pk = pkey;
78 if (pk == NULL)
81 switch (pk->type) {
125 EVP_PKEY_free(pk);
/freebsd-10-stable/crypto/openssl/crypto/x509v3/
H A Dv3_skey.c106 ASN1_BIT_STRING *pk; local
127 pk = ctx->subject_req->req_info->pubkey->public_key;
129 pk = ctx->subject_cert->cert_info->key->public_key;
131 if (!pk) {
137 (pk->data, pk->length, pkey_dig, &diglen, EVP_sha1(), NULL))
/freebsd-10-stable/crypto/openssh/
H A Ded25519.c14 static void get_hram(unsigned char *hram, const unsigned char *sm, const unsigned char *pk, unsigned char *playground, unsigned long long smlen) argument
19 for (i = 32;i < 64;++i) playground[i] = pk[i-32];
27 unsigned char *pk,
45 ge25519_pack(pk, &gepk);
47 sk[32 + i] = pk[i];
106 const unsigned char *pk
119 if (ge25519_unpackneg_vartime(&get1, pk)) return -1;
121 get_hram(hram,sm,pk,m,smlen);
26 crypto_sign_ed25519_keypair( unsigned char *pk, unsigned char *sk ) argument
/freebsd-10-stable/usr.bin/newkey/
H A Dgeneric.c82 MINT *pk = mp_itom(0); local
103 mp_pow(root, sk, modulus, pk);
106 xkey = mp_mtox(pk);
110 mp_mfree(pk);
/freebsd-10-stable/contrib/unbound/validator/
H A Dval_secalgo.c725 SECKEYPublicKey* pk; local
761 pk = nss_key_create(ecKey);
762 if(!pk)
764 pk->u.ec.size = (len/2)*8;
765 if(SECITEM_CopyItem(pk->arena, &pk->u.ec.publicValue, &pub)) {
766 SECKEY_DestroyPublicKey(pk);
769 if(SECITEM_CopyItem(pk->arena, &pk->u.ec.DEREncodedParams, &params)) {
770 SECKEY_DestroyPublicKey(pk);
779 SECKEYPublicKey* pk; local
840 SECKEYPublicKey* pk; local
[all...]
/freebsd-10-stable/crypto/openssl/crypto/ec/
H A Deck_prn.c119 EVP_PKEY *pk; local
121 pk = EVP_PKEY_new();
122 if (!pk || !EVP_PKEY_set1_EC_KEY(pk, (EC_KEY *)x))
124 ret = EVP_PKEY_print_private(bp, pk, off, NULL);
125 EVP_PKEY_free(pk);
131 EVP_PKEY *pk; local
133 pk = EVP_PKEY_new();
134 if (!pk || !EVP_PKEY_set1_EC_KEY(pk, (EC_KE
[all...]
/freebsd-10-stable/crypto/heimdal/lib/hx509/
H A Dtest_windows.in63 --pk-init-principal="krbtgt/HEIMDAL.PKI@HEIMDAL.PKI" \
76 --pk-init-principal="user@HEIMDAL.PKI" \
/freebsd-10-stable/crypto/openssl/engines/ccgost/
H A Dgost_ameth.c297 static int priv_decode_gost(EVP_PKEY *pk, PKCS8_PRIV_KEY_INFO *p8inf) argument
310 if (!decode_gost_algor_params(pk, palg)) {
339 ret = gost_set_priv_key(pk, pk_num);
345 static int priv_encode_gost(PKCS8_PRIV_KEY_INFO *p8, const EVP_PKEY *pk) argument
347 ASN1_OBJECT *algobj = OBJ_nid2obj(EVP_PKEY_base_id(pk));
348 ASN1_STRING *params = encode_gost_algor_params(pk);
356 asn1key = BN_to_ASN1_INTEGER(gost_get0_priv_key(pk), NULL);
498 static int param_missing_gost94(const EVP_PKEY *pk) argument
500 const DSA *dsa = EVP_PKEY_get0((EVP_PKEY *)pk);
508 static int param_missing_gost01(const EVP_PKEY *pk) argument
599 pub_decode_gost94(EVP_PKEY *pk, X509_PUBKEY *pub) argument
631 pub_encode_gost94(X509_PUBKEY *pub, const EVP_PKEY *pk) argument
664 pub_decode_gost01(EVP_PKEY *pk, X509_PUBKEY *pub) argument
718 pub_encode_gost01(X509_PUBKEY *pub, const EVP_PKEY *pk) argument
811 pkey_size_gost(const EVP_PKEY *pk) argument
816 pkey_bits_gost(const EVP_PKEY *pk) argument
822 mackey_free_gost(EVP_PKEY *pk) argument
[all...]
/freebsd-10-stable/contrib/wpa/src/crypto/
H A Dcrypto_libtomcrypt.c419 struct crypto_public_key *pk; local
421 pk = os_zalloc(sizeof(*pk));
422 if (pk == NULL)
425 res = rsa_import(key, len, &pk->rsa);
430 os_free(pk);
434 if (pk->rsa.type != PK_PUBLIC) {
437 rsa_free(&pk->rsa);
438 os_free(pk);
442 return pk;
451 struct crypto_private_key *pk; local
[all...]
H A Dcrypto_cryptoapi.c661 struct crypto_public_key *pk; local
664 pk = os_zalloc(sizeof(*pk));
665 if (pk == NULL)
672 os_free(pk);
676 if (!CryptAcquireContext(&pk->prov, NULL, MS_DEF_PROV, PROV_RSA_FULL,
679 os_free(pk);
684 if (!CryptImportPublicKeyInfo(pk->prov, X509_ASN_ENCODING |
687 &pk->rsa)) {
689 CryptReleaseContext(pk
[all...]
/freebsd-10-stable/crypto/openssl/apps/
H A Ddsa.c334 EVP_PKEY *pk; local
335 pk = EVP_PKEY_new();
336 EVP_PKEY_set1_DSA(pk, dsa);
338 i = i2b_PVK_bio(out, pk, pvk_encr, 0, passout);
340 i = i2b_PublicKey_bio(out, pk);
342 i = i2b_PrivateKey_bio(out, pk);
343 EVP_PKEY_free(pk);
H A Drsa.c401 EVP_PKEY *pk; local
402 pk = EVP_PKEY_new();
403 EVP_PKEY_set1_RSA(pk, rsa);
405 i = i2b_PVK_bio(out, pk, pvk_encr, 0, passout);
407 i = i2b_PublicKey_bio(out, pk);
409 i = i2b_PrivateKey_bio(out, pk);
410 EVP_PKEY_free(pk);
/freebsd-10-stable/lib/libtelnet/
H A DMakefile20 SRCS+= encrypt.c auth.c enc_des.c sra.c pk.c
/freebsd-10-stable/contrib/wpa/src/eap_common/
H A Deap_gpsk_common.c113 u8 *pk, size_t pk_len)
179 if (pk) {
181 os_memcpy(pk, pos, pk_len);
191 u8 *pk, size_t *pk_len)
219 pk, *pk_len);
274 * @pk: Buffer for PK (at least EAP_GPSK_MAX_PK_LEN bytes)
284 u8 *pk, size_t *pk_len)
322 pk, pk_len);
107 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) argument
188 eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument
278 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument
/freebsd-10-stable/contrib/libpcap/
H A Ddlpisubs.c124 u_char *ep, *pk; local
166 pk = bufp + sizeof(*sbp);
173 pk = bufp;
177 if (bpf_filter(p->fcode.bf_insns, pk, origlen, caplen)) {
189 (*callback)(user, &pkthdr, pk);
/freebsd-10-stable/contrib/wpa/src/tls/
H A Dtlsv1_common.c144 * @pk: Buffer for returning the allocated public key
151 int tls_parse_cert(const u8 *buf, size_t len, struct crypto_public_key **pk) argument
158 *pk = crypto_public_key_from_cert(buf, len);
159 if (*pk)
181 *pk = crypto_public_key_import(cert->public_key, cert->public_key_len);
184 if (*pk == NULL) {
/freebsd-10-stable/crypto/openssl/crypto/pem/
H A Dpvkfmt.c466 static int do_i2b(unsigned char **out, EVP_PKEY *pk, int ispub) argument
471 if (pk->type == EVP_PKEY_DSA) {
472 bitlen = check_bitlen_dsa(pk->pkey.dsa, ispub, &magic);
474 } else if (pk->type == EVP_PKEY_RSA) {
475 bitlen = check_bitlen_rsa(pk->pkey.rsa, ispub, &magic);
505 write_dsa(&p, pk->pkey.dsa, ispub);
507 write_rsa(&p, pk->pkey.rsa, ispub);
513 static int do_i2b_bio(BIO *out, EVP_PKEY *pk, int ispub) argument
517 outlen = do_i2b(&tmp, pk, ispub);
615 int i2b_PrivateKey_bio(BIO *out, EVP_PKEY *pk) argument
620 i2b_PublicKey_bio(BIO *out, EVP_PKEY *pk) argument
798 i2b_PVK(unsigned char **out, EVP_PKEY *pk, int enclevel, pem_password_cb *cb, void *u) argument
876 i2b_PVK_bio(BIO *out, EVP_PKEY *pk, int enclevel, pem_password_cb *cb, void *u) argument
[all...]
/freebsd-10-stable/contrib/sendmail/contrib/
H A Detrn.pl254 (my $pk, my $file, my $line);
255 ($pk, $file, $line) = caller;
/freebsd-10-stable/crypto/openssl/crypto/cms/
H A Dcms_env.c151 EVP_PKEY *pk = NULL; local
172 pk = X509_get_pubkey(recip);
173 if (!pk) {
178 ktri->pkey = pk;
199 if (pk->ameth && pk->ameth->pkey_ctrl) {
200 i = pk->ameth->pkey_ctrl(pk, ASN1_PKEY_CTRL_CMS_ENVELOPE, 0, ri);
227 EVP_PKEY **pk, X509 **recip,
239 if (pk)
226 CMS_RecipientInfo_ktri_get0_algs(CMS_RecipientInfo *ri, EVP_PKEY **pk, X509 **recip, X509_ALGOR **palg) argument
[all...]

Completed in 314 milliseconds

1234