/freebsd-10.0-release/crypto/openssl/crypto/dsa/ |
H A D | dsa_prn.c | 100 EVP_PKEY *pk; local 102 pk = EVP_PKEY_new(); 103 if (!pk || !EVP_PKEY_set1_DSA(pk, (DSA *)x)) 105 ret = EVP_PKEY_print_private(bp, pk, off, NULL); 106 EVP_PKEY_free(pk); 112 EVP_PKEY *pk; local 114 pk = EVP_PKEY_new(); 115 if (!pk || !EVP_PKEY_set1_DSA(pk, (DS [all...] |
/freebsd-10.0-release/crypto/openssl/crypto/rsa/ |
H A D | rsa_prn.c | 84 EVP_PKEY *pk; local 86 pk = EVP_PKEY_new(); 87 if (!pk || !EVP_PKEY_set1_RSA(pk, (RSA *)x)) 89 ret = EVP_PKEY_print_private(bp, pk, off, NULL); 90 EVP_PKEY_free(pk);
|
/freebsd-10.0-release/crypto/openssl/crypto/x509/ |
H A D | x509type.c | 67 EVP_PKEY *pk; local 73 pk=X509_get_pubkey(x); 75 pk=pkey; 77 if (pk == NULL) return(0); 79 switch (pk->type) 125 if (EVP_PKEY_size(pk) <= 1024/8)/* /8 because it's 1024 bits we look 128 if(pkey==NULL) EVP_PKEY_free(pk);
|
/freebsd-10.0-release/crypto/openssl/crypto/asn1/ |
H A D | asn1_locl.h | 83 int (*pub_decode)(EVP_PKEY *pk, X509_PUBKEY *pub); 84 int (*pub_encode)(X509_PUBKEY *pub, const EVP_PKEY *pk); 89 int (*priv_decode)(EVP_PKEY *pk, PKCS8_PRIV_KEY_INFO *p8inf); 90 int (*priv_encode)(PKCS8_PRIV_KEY_INFO *p8, const EVP_PKEY *pk); 94 int (*pkey_size)(const EVP_PKEY *pk); 95 int (*pkey_bits)(const EVP_PKEY *pk); 100 int (*param_missing)(const EVP_PKEY *pk); 144 int (*crl_verify)(X509_CRL *crl, EVP_PKEY *pk);
|
H A D | p8_pkey.c | 125 const unsigned char **pk, int *ppklen, 134 if (pk) 136 *pk = p8->pkey->value.octet_string->data; 143 if (pk) 145 *pk = p8->pkey->value.sequence->data;
|
H A D | x_pubkey.c | 92 X509_PUBKEY *pk=NULL; 96 if ((pk=X509_PUBKEY_new()) == NULL) goto error; 102 if (!pkey->ameth->pub_encode(pk, pkey)) 125 *x=pk; 129 if (pk != NULL) X509_PUBKEY_free(pk); 371 const unsigned char **pk, int *ppklen, 377 if (pk) 379 *pk = pub->public_key->data;
|
H A D | ameth_lib.c | 409 int (*pub_decode)(EVP_PKEY *pk, X509_PUBKEY *pub), 410 int (*pub_encode)(X509_PUBKEY *pub, const EVP_PKEY *pk), 414 int (*pkey_size)(const EVP_PKEY *pk), 415 int (*pkey_bits)(const EVP_PKEY *pk)) 426 int (*priv_decode)(EVP_PKEY *pk, PKCS8_PRIV_KEY_INFO *p8inf), 427 int (*priv_encode)(PKCS8_PRIV_KEY_INFO *p8, const EVP_PKEY *pk), 440 int (*param_missing)(const EVP_PKEY *pk), 408 EVP_PKEY_asn1_set_public(EVP_PKEY_ASN1_METHOD *ameth, int (*pub_decode)(EVP_PKEY *pk, X509_PUBKEY *pub), int (*pub_encode)(X509_PUBKEY *pub, const EVP_PKEY *pk), int (*pub_cmp)(const EVP_PKEY *a, const EVP_PKEY *b), int (*pub_print)(BIO *out, const EVP_PKEY *pkey, int indent, ASN1_PCTX *pctx), int (*pkey_size)(const EVP_PKEY *pk), int (*pkey_bits)(const EVP_PKEY *pk)) argument 425 EVP_PKEY_asn1_set_private(EVP_PKEY_ASN1_METHOD *ameth, int (*priv_decode)(EVP_PKEY *pk, PKCS8_PRIV_KEY_INFO *p8inf), int (*priv_encode)(PKCS8_PRIV_KEY_INFO *p8, const EVP_PKEY *pk), int (*priv_print)(BIO *out, const EVP_PKEY *pkey, int indent, ASN1_PCTX *pctx)) argument 436 EVP_PKEY_asn1_set_param(EVP_PKEY_ASN1_METHOD *ameth, int (*param_decode)(EVP_PKEY *pkey, const unsigned char **pder, int derlen), int (*param_encode)(const EVP_PKEY *pkey, unsigned char **pder), int (*param_missing)(const EVP_PKEY *pk), int (*param_copy)(EVP_PKEY *to, const EVP_PKEY *from), int (*param_cmp)(const EVP_PKEY *a, const EVP_PKEY *b), int (*param_print)(BIO *out, const EVP_PKEY *pkey, int indent, ASN1_PCTX *pctx)) argument
|
/freebsd-10.0-release/crypto/openssl/crypto/x509v3/ |
H A D | v3_skey.c | 105 ASN1_BIT_STRING *pk; local 124 pk = ctx->subject_req->req_info->pubkey->public_key; 125 else pk = ctx->subject_cert->cert_info->key->public_key; 127 if(!pk) { 132 if (!EVP_Digest(pk->data, pk->length, pkey_dig, &diglen, EVP_sha1(), NULL))
|
/freebsd-10.0-release/contrib/unbound/validator/ |
H A D | val_secalgo.c | 669 SECKEYPublicKey* pk; local 705 pk = nss_key_create(ecKey); 706 if(!pk) 708 pk->u.ec.size = (len/2)*8; 709 if(SECITEM_CopyItem(pk->arena, &pk->u.ec.publicValue, &pub)) { 710 SECKEY_DestroyPublicKey(pk); 713 if(SECITEM_CopyItem(pk->arena, &pk->u.ec.DEREncodedParams, ¶ms)) { 714 SECKEY_DestroyPublicKey(pk); 723 SECKEYPublicKey* pk; local 784 SECKEYPublicKey* pk; local [all...] |
/freebsd-10.0-release/usr.bin/newkey/ |
H A D | generic.c | 82 MINT *pk = mp_itom(0); local 103 mp_pow(root, sk, modulus, pk); 106 xkey = mp_mtox(pk); 110 mp_mfree(pk);
|
/freebsd-10.0-release/crypto/openssl/crypto/ec/ |
H A D | eck_prn.c | 122 EVP_PKEY *pk; local 124 pk = EVP_PKEY_new(); 125 if (!pk || !EVP_PKEY_set1_EC_KEY(pk, (EC_KEY *)x)) 127 ret = EVP_PKEY_print_private(bp, pk, off, NULL); 128 EVP_PKEY_free(pk); 134 EVP_PKEY *pk; local 136 pk = EVP_PKEY_new(); 137 if (!pk || !EVP_PKEY_set1_EC_KEY(pk, (EC_KE [all...] |
/freebsd-10.0-release/crypto/heimdal/lib/hx509/ |
H A D | test_windows.in | 63 --pk-init-principal="krbtgt/HEIMDAL.PKI@HEIMDAL.PKI" \ 76 --pk-init-principal="user@HEIMDAL.PKI" \
|
/freebsd-10.0-release/crypto/openssl/engines/ccgost/ |
H A D | gost_ameth.c | 309 static int priv_decode_gost( EVP_PKEY *pk, PKCS8_PRIV_KEY_INFO *p8inf) argument 322 if (!decode_gost_algor_params(pk,palg)) 359 ret= gost_set_priv_key(pk,pk_num); 365 static int priv_encode_gost(PKCS8_PRIV_KEY_INFO *p8, const EVP_PKEY *pk) argument 367 ASN1_OBJECT *algobj = OBJ_nid2obj(EVP_PKEY_base_id(pk)); 368 ASN1_STRING *params = encode_gost_algor_params(pk); 377 asn1key = BN_to_ASN1_INTEGER(gost_get0_priv_key(pk),NULL); 511 static int param_missing_gost94(const EVP_PKEY *pk) argument 513 const DSA *dsa = EVP_PKEY_get0((EVP_PKEY *)pk); 519 static int param_missing_gost01(const EVP_PKEY *pk) argument 606 pub_decode_gost94(EVP_PKEY *pk, X509_PUBKEY *pub) argument 639 pub_encode_gost94(X509_PUBKEY *pub,const EVP_PKEY *pk) argument 673 pub_decode_gost01(EVP_PKEY *pk,X509_PUBKEY *pub) argument 733 pub_encode_gost01(X509_PUBKEY *pub,const EVP_PKEY *pk) argument 818 pkey_size_gost(const EVP_PKEY *pk) argument 823 pkey_bits_gost(const EVP_PKEY *pk) argument 828 mackey_free_gost(EVP_PKEY *pk) argument [all...] |
/freebsd-10.0-release/contrib/wpa/src/crypto/ |
H A D | crypto_libtomcrypt.c | 419 struct crypto_public_key *pk; local 421 pk = os_zalloc(sizeof(*pk)); 422 if (pk == NULL) 425 res = rsa_import(key, len, &pk->rsa); 430 os_free(pk); 434 if (pk->rsa.type != PK_PUBLIC) { 437 rsa_free(&pk->rsa); 438 os_free(pk); 442 return pk; 451 struct crypto_private_key *pk; local [all...] |
H A D | crypto_cryptoapi.c | 661 struct crypto_public_key *pk; local 664 pk = os_zalloc(sizeof(*pk)); 665 if (pk == NULL) 672 os_free(pk); 676 if (!CryptAcquireContext(&pk->prov, NULL, MS_DEF_PROV, PROV_RSA_FULL, 679 os_free(pk); 684 if (!CryptImportPublicKeyInfo(pk->prov, X509_ASN_ENCODING | 687 &pk->rsa)) { 689 CryptReleaseContext(pk [all...] |
/freebsd-10.0-release/crypto/openssl/apps/ |
H A D | dsa.c | 339 EVP_PKEY *pk; local 340 pk = EVP_PKEY_new(); 341 EVP_PKEY_set1_DSA(pk, dsa); 343 i = i2b_PVK_bio(out, pk, pvk_encr, 0, passout); 345 i = i2b_PublicKey_bio(out, pk); 347 i = i2b_PrivateKey_bio(out, pk); 348 EVP_PKEY_free(pk);
|
H A D | rsa.c | 414 EVP_PKEY *pk; local 415 pk = EVP_PKEY_new(); 416 EVP_PKEY_set1_RSA(pk, rsa); 418 i = i2b_PVK_bio(out, pk, pvk_encr, 0, passout); 420 i = i2b_PublicKey_bio(out, pk); 422 i = i2b_PrivateKey_bio(out, pk); 423 EVP_PKEY_free(pk);
|
/freebsd-10.0-release/lib/libtelnet/ |
H A D | Makefile | 20 SRCS+= encrypt.c auth.c enc_des.c sra.c pk.c
|
/freebsd-10.0-release/contrib/wpa/src/eap_common/ |
H A D | eap_gpsk_common.c | 113 u8 *pk, size_t pk_len) 179 if (pk) { 181 os_memcpy(pk, pos, pk_len); 191 u8 *pk, size_t *pk_len) 219 pk, *pk_len); 274 * @pk: Buffer for PK (at least EAP_GPSK_MAX_PK_LEN bytes) 284 u8 *pk, size_t *pk_len) 322 pk, pk_len); 107 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) argument 188 eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument 278 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument
|
/freebsd-10.0-release/contrib/libpcap/ |
H A D | dlpisubs.c | 124 u_char *ep, *pk; local 166 pk = bufp + sizeof(*sbp); 173 pk = bufp; 177 if (bpf_filter(p->fcode.bf_insns, pk, origlen, caplen)) { 189 (*callback)(user, &pkthdr, pk);
|
/freebsd-10.0-release/contrib/wpa/src/tls/ |
H A D | tlsv1_common.c | 144 * @pk: Buffer for returning the allocated public key 151 int tls_parse_cert(const u8 *buf, size_t len, struct crypto_public_key **pk) argument 158 *pk = crypto_public_key_from_cert(buf, len); 159 if (*pk) 181 *pk = crypto_public_key_import(cert->public_key, cert->public_key_len); 184 if (*pk == NULL) {
|
/freebsd-10.0-release/crypto/openssl/crypto/pem/ |
H A D | pvkfmt.c | 484 static int do_i2b(unsigned char **out, EVP_PKEY *pk, int ispub) argument 489 if (pk->type == EVP_PKEY_DSA) 491 bitlen = check_bitlen_dsa(pk->pkey.dsa, ispub, &magic); 494 else if (pk->type == EVP_PKEY_RSA) 496 bitlen = check_bitlen_rsa(pk->pkey.rsa, ispub, &magic); 528 write_dsa(&p, pk->pkey.dsa, ispub); 530 write_rsa(&p, pk->pkey.rsa, ispub); 536 static int do_i2b_bio(BIO *out, EVP_PKEY *pk, int ispub) argument 540 outlen = do_i2b(&tmp, pk, ispub); 647 int i2b_PrivateKey_bio(BIO *out, EVP_PKEY *pk) argument 652 i2b_PublicKey_bio(BIO *out, EVP_PKEY *pk) argument 935 i2b_PVK_bio(BIO *out, EVP_PKEY *pk, int enclevel, pem_password_cb *cb, void *u) argument [all...] |
/freebsd-10.0-release/contrib/sendmail/contrib/ |
H A D | etrn.pl | 254 (my $pk, my $file, my $line); 255 ($pk, $file, $line) = caller;
|
/freebsd-10.0-release/crypto/openssl/crypto/cms/ |
H A D | cms_env.c | 153 EVP_PKEY *pk = NULL; local 174 pk = X509_get_pubkey(recip); 175 if (!pk) 182 ktri->pkey = pk; 205 if (pk->ameth && pk->ameth->pkey_ctrl) 207 i = pk->ameth->pkey_ctrl(pk, ASN1_PKEY_CTRL_CMS_ENVELOPE, 238 EVP_PKEY **pk, X509 **recip, 251 if (pk) 237 CMS_RecipientInfo_ktri_get0_algs(CMS_RecipientInfo *ri, EVP_PKEY **pk, X509 **recip, X509_ALGOR **palg) argument [all...] |
/freebsd-10.0-release/contrib/telnet/libtelnet/ |
H A D | pk.c | 54 #include "pk.h" 164 MINT *pk = mp_itom(0); local 185 mp_pow(root, sk, modulus, pk); 188 xkey = mp_mtox(pk); 192 mp_mfree(pk);
|