/freebsd-10-stable/crypto/openssl/crypto/dsa/ |
H A D | dsa_prn.c | 99 EVP_PKEY *pk; local 101 pk = EVP_PKEY_new(); 102 if (!pk || !EVP_PKEY_set1_DSA(pk, (DSA *)x)) 104 ret = EVP_PKEY_print_private(bp, pk, off, NULL); 105 EVP_PKEY_free(pk); 111 EVP_PKEY *pk; local 113 pk = EVP_PKEY_new(); 114 if (!pk || !EVP_PKEY_set1_DSA(pk, (DS [all...] |
/freebsd-10-stable/crypto/openssl/crypto/rsa/ |
H A D | rsa_prn.c | 84 EVP_PKEY *pk; local 86 pk = EVP_PKEY_new(); 87 if (!pk || !EVP_PKEY_set1_RSA(pk, (RSA *)x)) 89 ret = EVP_PKEY_print_private(bp, pk, off, NULL); 90 EVP_PKEY_free(pk);
|
/freebsd-10-stable/crypto/openssl/crypto/asn1/ |
H A D | asn1_locl.h | 80 int (*pub_decode) (EVP_PKEY *pk, X509_PUBKEY *pub); 81 int (*pub_encode) (X509_PUBKEY *pub, const EVP_PKEY *pk); 85 int (*priv_decode) (EVP_PKEY *pk, PKCS8_PRIV_KEY_INFO *p8inf); 86 int (*priv_encode) (PKCS8_PRIV_KEY_INFO *p8, const EVP_PKEY *pk); 89 int (*pkey_size) (const EVP_PKEY *pk); 90 int (*pkey_bits) (const EVP_PKEY *pk); 94 int (*param_missing) (const EVP_PKEY *pk); 131 int (*crl_verify) (X509_CRL *crl, EVP_PKEY *pk);
|
H A D | p8_pkey.c | 123 const unsigned char **pk, int *ppklen, 130 if (pk) { 131 *pk = p8->pkey->value.octet_string->data; 136 if (pk) { 137 *pk = p8->pkey->value.sequence->data;
|
H A D | x_pubkey.c | 91 X509_PUBKEY *pk = NULL; 96 if ((pk = X509_PUBKEY_new()) == NULL) 101 if (!pkey->ameth->pub_encode(pk, pkey)) { 118 *x = pk; 122 if (pk != NULL) 123 X509_PUBKEY_free(pk); 362 const unsigned char **pk, int *ppklen, 367 if (pk) { 368 *pk = pub->public_key->data;
|
H A D | ameth_lib.c | 392 int (*pub_decode) (EVP_PKEY *pk, 395 const EVP_PKEY *pk), 401 int (*pkey_size) (const EVP_PKEY *pk), 402 int (*pkey_bits) (const EVP_PKEY *pk)) 413 int (*priv_decode) (EVP_PKEY *pk, 417 const EVP_PKEY *pk), 434 int (*param_missing) (const EVP_PKEY *pk), 391 EVP_PKEY_asn1_set_public(EVP_PKEY_ASN1_METHOD *ameth, int (*pub_decode) (EVP_PKEY *pk, X509_PUBKEY *pub), int (*pub_encode) (X509_PUBKEY *pub, const EVP_PKEY *pk), int (*pub_cmp) (const EVP_PKEY *a, const EVP_PKEY *b), int (*pub_print) (BIO *out, const EVP_PKEY *pkey, int indent, ASN1_PCTX *pctx), int (*pkey_size) (const EVP_PKEY *pk), int (*pkey_bits) (const EVP_PKEY *pk)) argument 412 EVP_PKEY_asn1_set_private(EVP_PKEY_ASN1_METHOD *ameth, int (*priv_decode) (EVP_PKEY *pk, PKCS8_PRIV_KEY_INFO *p8inf), int (*priv_encode) (PKCS8_PRIV_KEY_INFO *p8, const EVP_PKEY *pk), int (*priv_print) (BIO *out, const EVP_PKEY *pkey, int indent, ASN1_PCTX *pctx)) argument 428 EVP_PKEY_asn1_set_param(EVP_PKEY_ASN1_METHOD *ameth, int (*param_decode) (EVP_PKEY *pkey, const unsigned char **pder, int derlen), int (*param_encode) (const EVP_PKEY *pkey, unsigned char **pder), int (*param_missing) (const EVP_PKEY *pk), int (*param_copy) (EVP_PKEY *to, const EVP_PKEY *from), int (*param_cmp) (const EVP_PKEY *a, const EVP_PKEY *b), int (*param_print) (BIO *out, const EVP_PKEY *pkey, int indent, ASN1_PCTX *pctx)) argument
|
/freebsd-10-stable/crypto/openssl/crypto/x509/ |
H A D | x509type.c | 67 EVP_PKEY *pk; local 74 pk = X509_get_pubkey(x); 76 pk = pkey; 78 if (pk == NULL) 81 switch (pk->type) { 125 EVP_PKEY_free(pk);
|
/freebsd-10-stable/crypto/openssl/crypto/x509v3/ |
H A D | v3_skey.c | 106 ASN1_BIT_STRING *pk; local 127 pk = ctx->subject_req->req_info->pubkey->public_key; 129 pk = ctx->subject_cert->cert_info->key->public_key; 131 if (!pk) { 137 (pk->data, pk->length, pkey_dig, &diglen, EVP_sha1(), NULL))
|
/freebsd-10-stable/crypto/openssh/ |
H A D | ed25519.c | 14 static void get_hram(unsigned char *hram, const unsigned char *sm, const unsigned char *pk, unsigned char *playground, unsigned long long smlen) argument 19 for (i = 32;i < 64;++i) playground[i] = pk[i-32]; 27 unsigned char *pk, 45 ge25519_pack(pk, &gepk); 47 sk[32 + i] = pk[i]; 106 const unsigned char *pk 119 if (ge25519_unpackneg_vartime(&get1, pk)) return -1; 121 get_hram(hram,sm,pk,m,smlen); 26 crypto_sign_ed25519_keypair( unsigned char *pk, unsigned char *sk ) argument
|
/freebsd-10-stable/usr.bin/newkey/ |
H A D | generic.c | 82 MINT *pk = mp_itom(0); local 103 mp_pow(root, sk, modulus, pk); 106 xkey = mp_mtox(pk); 110 mp_mfree(pk);
|
/freebsd-10-stable/contrib/unbound/validator/ |
H A D | val_secalgo.c | 725 SECKEYPublicKey* pk; local 761 pk = nss_key_create(ecKey); 762 if(!pk) 764 pk->u.ec.size = (len/2)*8; 765 if(SECITEM_CopyItem(pk->arena, &pk->u.ec.publicValue, &pub)) { 766 SECKEY_DestroyPublicKey(pk); 769 if(SECITEM_CopyItem(pk->arena, &pk->u.ec.DEREncodedParams, ¶ms)) { 770 SECKEY_DestroyPublicKey(pk); 779 SECKEYPublicKey* pk; local 840 SECKEYPublicKey* pk; local [all...] |
/freebsd-10-stable/crypto/openssl/crypto/ec/ |
H A D | eck_prn.c | 119 EVP_PKEY *pk; local 121 pk = EVP_PKEY_new(); 122 if (!pk || !EVP_PKEY_set1_EC_KEY(pk, (EC_KEY *)x)) 124 ret = EVP_PKEY_print_private(bp, pk, off, NULL); 125 EVP_PKEY_free(pk); 131 EVP_PKEY *pk; local 133 pk = EVP_PKEY_new(); 134 if (!pk || !EVP_PKEY_set1_EC_KEY(pk, (EC_KE [all...] |
/freebsd-10-stable/crypto/heimdal/lib/hx509/ |
H A D | test_windows.in | 63 --pk-init-principal="krbtgt/HEIMDAL.PKI@HEIMDAL.PKI" \ 76 --pk-init-principal="user@HEIMDAL.PKI" \
|
/freebsd-10-stable/crypto/openssl/engines/ccgost/ |
H A D | gost_ameth.c | 297 static int priv_decode_gost(EVP_PKEY *pk, PKCS8_PRIV_KEY_INFO *p8inf) argument 310 if (!decode_gost_algor_params(pk, palg)) { 339 ret = gost_set_priv_key(pk, pk_num); 345 static int priv_encode_gost(PKCS8_PRIV_KEY_INFO *p8, const EVP_PKEY *pk) argument 347 ASN1_OBJECT *algobj = OBJ_nid2obj(EVP_PKEY_base_id(pk)); 348 ASN1_STRING *params = encode_gost_algor_params(pk); 356 asn1key = BN_to_ASN1_INTEGER(gost_get0_priv_key(pk), NULL); 498 static int param_missing_gost94(const EVP_PKEY *pk) argument 500 const DSA *dsa = EVP_PKEY_get0((EVP_PKEY *)pk); 508 static int param_missing_gost01(const EVP_PKEY *pk) argument 599 pub_decode_gost94(EVP_PKEY *pk, X509_PUBKEY *pub) argument 631 pub_encode_gost94(X509_PUBKEY *pub, const EVP_PKEY *pk) argument 664 pub_decode_gost01(EVP_PKEY *pk, X509_PUBKEY *pub) argument 718 pub_encode_gost01(X509_PUBKEY *pub, const EVP_PKEY *pk) argument 811 pkey_size_gost(const EVP_PKEY *pk) argument 816 pkey_bits_gost(const EVP_PKEY *pk) argument 822 mackey_free_gost(EVP_PKEY *pk) argument [all...] |
/freebsd-10-stable/contrib/wpa/src/crypto/ |
H A D | crypto_libtomcrypt.c | 419 struct crypto_public_key *pk; local 421 pk = os_zalloc(sizeof(*pk)); 422 if (pk == NULL) 425 res = rsa_import(key, len, &pk->rsa); 430 os_free(pk); 434 if (pk->rsa.type != PK_PUBLIC) { 437 rsa_free(&pk->rsa); 438 os_free(pk); 442 return pk; 451 struct crypto_private_key *pk; local [all...] |
H A D | crypto_cryptoapi.c | 661 struct crypto_public_key *pk; local 664 pk = os_zalloc(sizeof(*pk)); 665 if (pk == NULL) 672 os_free(pk); 676 if (!CryptAcquireContext(&pk->prov, NULL, MS_DEF_PROV, PROV_RSA_FULL, 679 os_free(pk); 684 if (!CryptImportPublicKeyInfo(pk->prov, X509_ASN_ENCODING | 687 &pk->rsa)) { 689 CryptReleaseContext(pk [all...] |
/freebsd-10-stable/crypto/openssl/apps/ |
H A D | dsa.c | 334 EVP_PKEY *pk; local 335 pk = EVP_PKEY_new(); 336 EVP_PKEY_set1_DSA(pk, dsa); 338 i = i2b_PVK_bio(out, pk, pvk_encr, 0, passout); 340 i = i2b_PublicKey_bio(out, pk); 342 i = i2b_PrivateKey_bio(out, pk); 343 EVP_PKEY_free(pk);
|
H A D | rsa.c | 401 EVP_PKEY *pk; local 402 pk = EVP_PKEY_new(); 403 EVP_PKEY_set1_RSA(pk, rsa); 405 i = i2b_PVK_bio(out, pk, pvk_encr, 0, passout); 407 i = i2b_PublicKey_bio(out, pk); 409 i = i2b_PrivateKey_bio(out, pk); 410 EVP_PKEY_free(pk);
|
/freebsd-10-stable/lib/libtelnet/ |
H A D | Makefile | 20 SRCS+= encrypt.c auth.c enc_des.c sra.c pk.c
|
/freebsd-10-stable/contrib/wpa/src/eap_common/ |
H A D | eap_gpsk_common.c | 113 u8 *pk, size_t pk_len) 179 if (pk) { 181 os_memcpy(pk, pos, pk_len); 191 u8 *pk, size_t *pk_len) 219 pk, *pk_len); 274 * @pk: Buffer for PK (at least EAP_GPSK_MAX_PK_LEN bytes) 284 u8 *pk, size_t *pk_len) 322 pk, pk_len); 107 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) argument 188 eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument 278 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument
|
/freebsd-10-stable/contrib/libpcap/ |
H A D | dlpisubs.c | 124 u_char *ep, *pk; local 166 pk = bufp + sizeof(*sbp); 173 pk = bufp; 177 if (bpf_filter(p->fcode.bf_insns, pk, origlen, caplen)) { 189 (*callback)(user, &pkthdr, pk);
|
/freebsd-10-stable/contrib/wpa/src/tls/ |
H A D | tlsv1_common.c | 144 * @pk: Buffer for returning the allocated public key 151 int tls_parse_cert(const u8 *buf, size_t len, struct crypto_public_key **pk) argument 158 *pk = crypto_public_key_from_cert(buf, len); 159 if (*pk) 181 *pk = crypto_public_key_import(cert->public_key, cert->public_key_len); 184 if (*pk == NULL) {
|
/freebsd-10-stable/crypto/openssl/crypto/pem/ |
H A D | pvkfmt.c | 466 static int do_i2b(unsigned char **out, EVP_PKEY *pk, int ispub) argument 471 if (pk->type == EVP_PKEY_DSA) { 472 bitlen = check_bitlen_dsa(pk->pkey.dsa, ispub, &magic); 474 } else if (pk->type == EVP_PKEY_RSA) { 475 bitlen = check_bitlen_rsa(pk->pkey.rsa, ispub, &magic); 505 write_dsa(&p, pk->pkey.dsa, ispub); 507 write_rsa(&p, pk->pkey.rsa, ispub); 513 static int do_i2b_bio(BIO *out, EVP_PKEY *pk, int ispub) argument 517 outlen = do_i2b(&tmp, pk, ispub); 615 int i2b_PrivateKey_bio(BIO *out, EVP_PKEY *pk) argument 620 i2b_PublicKey_bio(BIO *out, EVP_PKEY *pk) argument 798 i2b_PVK(unsigned char **out, EVP_PKEY *pk, int enclevel, pem_password_cb *cb, void *u) argument 876 i2b_PVK_bio(BIO *out, EVP_PKEY *pk, int enclevel, pem_password_cb *cb, void *u) argument [all...] |
/freebsd-10-stable/contrib/sendmail/contrib/ |
H A D | etrn.pl | 254 (my $pk, my $file, my $line); 255 ($pk, $file, $line) = caller;
|
/freebsd-10-stable/crypto/openssl/crypto/cms/ |
H A D | cms_env.c | 151 EVP_PKEY *pk = NULL; local 172 pk = X509_get_pubkey(recip); 173 if (!pk) { 178 ktri->pkey = pk; 199 if (pk->ameth && pk->ameth->pkey_ctrl) { 200 i = pk->ameth->pkey_ctrl(pk, ASN1_PKEY_CTRL_CMS_ENVELOPE, 0, ri); 227 EVP_PKEY **pk, X509 **recip, 239 if (pk) 226 CMS_RecipientInfo_ktri_get0_algs(CMS_RecipientInfo *ri, EVP_PKEY **pk, X509 **recip, X509_ALGOR **palg) argument [all...] |