Searched refs:pk (Results 1 - 25 of 75) sorted by relevance

123

/freebsd-10.0-release/crypto/openssl/crypto/dsa/
H A Ddsa_prn.c100 EVP_PKEY *pk; local
102 pk = EVP_PKEY_new();
103 if (!pk || !EVP_PKEY_set1_DSA(pk, (DSA *)x))
105 ret = EVP_PKEY_print_private(bp, pk, off, NULL);
106 EVP_PKEY_free(pk);
112 EVP_PKEY *pk; local
114 pk = EVP_PKEY_new();
115 if (!pk || !EVP_PKEY_set1_DSA(pk, (DS
[all...]
/freebsd-10.0-release/crypto/openssl/crypto/rsa/
H A Drsa_prn.c84 EVP_PKEY *pk; local
86 pk = EVP_PKEY_new();
87 if (!pk || !EVP_PKEY_set1_RSA(pk, (RSA *)x))
89 ret = EVP_PKEY_print_private(bp, pk, off, NULL);
90 EVP_PKEY_free(pk);
/freebsd-10.0-release/crypto/openssl/crypto/x509/
H A Dx509type.c67 EVP_PKEY *pk; local
73 pk=X509_get_pubkey(x);
75 pk=pkey;
77 if (pk == NULL) return(0);
79 switch (pk->type)
125 if (EVP_PKEY_size(pk) <= 1024/8)/* /8 because it's 1024 bits we look
128 if(pkey==NULL) EVP_PKEY_free(pk);
/freebsd-10.0-release/crypto/openssl/crypto/asn1/
H A Dasn1_locl.h83 int (*pub_decode)(EVP_PKEY *pk, X509_PUBKEY *pub);
84 int (*pub_encode)(X509_PUBKEY *pub, const EVP_PKEY *pk);
89 int (*priv_decode)(EVP_PKEY *pk, PKCS8_PRIV_KEY_INFO *p8inf);
90 int (*priv_encode)(PKCS8_PRIV_KEY_INFO *p8, const EVP_PKEY *pk);
94 int (*pkey_size)(const EVP_PKEY *pk);
95 int (*pkey_bits)(const EVP_PKEY *pk);
100 int (*param_missing)(const EVP_PKEY *pk);
144 int (*crl_verify)(X509_CRL *crl, EVP_PKEY *pk);
H A Dp8_pkey.c125 const unsigned char **pk, int *ppklen,
134 if (pk)
136 *pk = p8->pkey->value.octet_string->data;
143 if (pk)
145 *pk = p8->pkey->value.sequence->data;
H A Dx_pubkey.c92 X509_PUBKEY *pk=NULL;
96 if ((pk=X509_PUBKEY_new()) == NULL) goto error;
102 if (!pkey->ameth->pub_encode(pk, pkey))
125 *x=pk;
129 if (pk != NULL) X509_PUBKEY_free(pk);
371 const unsigned char **pk, int *ppklen,
377 if (pk)
379 *pk = pub->public_key->data;
H A Dameth_lib.c409 int (*pub_decode)(EVP_PKEY *pk, X509_PUBKEY *pub),
410 int (*pub_encode)(X509_PUBKEY *pub, const EVP_PKEY *pk),
414 int (*pkey_size)(const EVP_PKEY *pk),
415 int (*pkey_bits)(const EVP_PKEY *pk))
426 int (*priv_decode)(EVP_PKEY *pk, PKCS8_PRIV_KEY_INFO *p8inf),
427 int (*priv_encode)(PKCS8_PRIV_KEY_INFO *p8, const EVP_PKEY *pk),
440 int (*param_missing)(const EVP_PKEY *pk),
408 EVP_PKEY_asn1_set_public(EVP_PKEY_ASN1_METHOD *ameth, int (*pub_decode)(EVP_PKEY *pk, X509_PUBKEY *pub), int (*pub_encode)(X509_PUBKEY *pub, const EVP_PKEY *pk), int (*pub_cmp)(const EVP_PKEY *a, const EVP_PKEY *b), int (*pub_print)(BIO *out, const EVP_PKEY *pkey, int indent, ASN1_PCTX *pctx), int (*pkey_size)(const EVP_PKEY *pk), int (*pkey_bits)(const EVP_PKEY *pk)) argument
425 EVP_PKEY_asn1_set_private(EVP_PKEY_ASN1_METHOD *ameth, int (*priv_decode)(EVP_PKEY *pk, PKCS8_PRIV_KEY_INFO *p8inf), int (*priv_encode)(PKCS8_PRIV_KEY_INFO *p8, const EVP_PKEY *pk), int (*priv_print)(BIO *out, const EVP_PKEY *pkey, int indent, ASN1_PCTX *pctx)) argument
436 EVP_PKEY_asn1_set_param(EVP_PKEY_ASN1_METHOD *ameth, int (*param_decode)(EVP_PKEY *pkey, const unsigned char **pder, int derlen), int (*param_encode)(const EVP_PKEY *pkey, unsigned char **pder), int (*param_missing)(const EVP_PKEY *pk), int (*param_copy)(EVP_PKEY *to, const EVP_PKEY *from), int (*param_cmp)(const EVP_PKEY *a, const EVP_PKEY *b), int (*param_print)(BIO *out, const EVP_PKEY *pkey, int indent, ASN1_PCTX *pctx)) argument
/freebsd-10.0-release/crypto/openssl/crypto/x509v3/
H A Dv3_skey.c105 ASN1_BIT_STRING *pk; local
124 pk = ctx->subject_req->req_info->pubkey->public_key;
125 else pk = ctx->subject_cert->cert_info->key->public_key;
127 if(!pk) {
132 if (!EVP_Digest(pk->data, pk->length, pkey_dig, &diglen, EVP_sha1(), NULL))
/freebsd-10.0-release/contrib/unbound/validator/
H A Dval_secalgo.c669 SECKEYPublicKey* pk; local
705 pk = nss_key_create(ecKey);
706 if(!pk)
708 pk->u.ec.size = (len/2)*8;
709 if(SECITEM_CopyItem(pk->arena, &pk->u.ec.publicValue, &pub)) {
710 SECKEY_DestroyPublicKey(pk);
713 if(SECITEM_CopyItem(pk->arena, &pk->u.ec.DEREncodedParams, &params)) {
714 SECKEY_DestroyPublicKey(pk);
723 SECKEYPublicKey* pk; local
784 SECKEYPublicKey* pk; local
[all...]
/freebsd-10.0-release/usr.bin/newkey/
H A Dgeneric.c82 MINT *pk = mp_itom(0); local
103 mp_pow(root, sk, modulus, pk);
106 xkey = mp_mtox(pk);
110 mp_mfree(pk);
/freebsd-10.0-release/crypto/openssl/crypto/ec/
H A Deck_prn.c122 EVP_PKEY *pk; local
124 pk = EVP_PKEY_new();
125 if (!pk || !EVP_PKEY_set1_EC_KEY(pk, (EC_KEY *)x))
127 ret = EVP_PKEY_print_private(bp, pk, off, NULL);
128 EVP_PKEY_free(pk);
134 EVP_PKEY *pk; local
136 pk = EVP_PKEY_new();
137 if (!pk || !EVP_PKEY_set1_EC_KEY(pk, (EC_KE
[all...]
/freebsd-10.0-release/crypto/heimdal/lib/hx509/
H A Dtest_windows.in63 --pk-init-principal="krbtgt/HEIMDAL.PKI@HEIMDAL.PKI" \
76 --pk-init-principal="user@HEIMDAL.PKI" \
/freebsd-10.0-release/crypto/openssl/engines/ccgost/
H A Dgost_ameth.c309 static int priv_decode_gost( EVP_PKEY *pk, PKCS8_PRIV_KEY_INFO *p8inf) argument
322 if (!decode_gost_algor_params(pk,palg))
359 ret= gost_set_priv_key(pk,pk_num);
365 static int priv_encode_gost(PKCS8_PRIV_KEY_INFO *p8, const EVP_PKEY *pk) argument
367 ASN1_OBJECT *algobj = OBJ_nid2obj(EVP_PKEY_base_id(pk));
368 ASN1_STRING *params = encode_gost_algor_params(pk);
377 asn1key = BN_to_ASN1_INTEGER(gost_get0_priv_key(pk),NULL);
511 static int param_missing_gost94(const EVP_PKEY *pk) argument
513 const DSA *dsa = EVP_PKEY_get0((EVP_PKEY *)pk);
519 static int param_missing_gost01(const EVP_PKEY *pk) argument
606 pub_decode_gost94(EVP_PKEY *pk, X509_PUBKEY *pub) argument
639 pub_encode_gost94(X509_PUBKEY *pub,const EVP_PKEY *pk) argument
673 pub_decode_gost01(EVP_PKEY *pk,X509_PUBKEY *pub) argument
733 pub_encode_gost01(X509_PUBKEY *pub,const EVP_PKEY *pk) argument
818 pkey_size_gost(const EVP_PKEY *pk) argument
823 pkey_bits_gost(const EVP_PKEY *pk) argument
828 mackey_free_gost(EVP_PKEY *pk) argument
[all...]
/freebsd-10.0-release/contrib/wpa/src/crypto/
H A Dcrypto_libtomcrypt.c419 struct crypto_public_key *pk; local
421 pk = os_zalloc(sizeof(*pk));
422 if (pk == NULL)
425 res = rsa_import(key, len, &pk->rsa);
430 os_free(pk);
434 if (pk->rsa.type != PK_PUBLIC) {
437 rsa_free(&pk->rsa);
438 os_free(pk);
442 return pk;
451 struct crypto_private_key *pk; local
[all...]
H A Dcrypto_cryptoapi.c661 struct crypto_public_key *pk; local
664 pk = os_zalloc(sizeof(*pk));
665 if (pk == NULL)
672 os_free(pk);
676 if (!CryptAcquireContext(&pk->prov, NULL, MS_DEF_PROV, PROV_RSA_FULL,
679 os_free(pk);
684 if (!CryptImportPublicKeyInfo(pk->prov, X509_ASN_ENCODING |
687 &pk->rsa)) {
689 CryptReleaseContext(pk
[all...]
/freebsd-10.0-release/crypto/openssl/apps/
H A Ddsa.c339 EVP_PKEY *pk; local
340 pk = EVP_PKEY_new();
341 EVP_PKEY_set1_DSA(pk, dsa);
343 i = i2b_PVK_bio(out, pk, pvk_encr, 0, passout);
345 i = i2b_PublicKey_bio(out, pk);
347 i = i2b_PrivateKey_bio(out, pk);
348 EVP_PKEY_free(pk);
H A Drsa.c414 EVP_PKEY *pk; local
415 pk = EVP_PKEY_new();
416 EVP_PKEY_set1_RSA(pk, rsa);
418 i = i2b_PVK_bio(out, pk, pvk_encr, 0, passout);
420 i = i2b_PublicKey_bio(out, pk);
422 i = i2b_PrivateKey_bio(out, pk);
423 EVP_PKEY_free(pk);
/freebsd-10.0-release/lib/libtelnet/
H A DMakefile20 SRCS+= encrypt.c auth.c enc_des.c sra.c pk.c
/freebsd-10.0-release/contrib/wpa/src/eap_common/
H A Deap_gpsk_common.c113 u8 *pk, size_t pk_len)
179 if (pk) {
181 os_memcpy(pk, pos, pk_len);
191 u8 *pk, size_t *pk_len)
219 pk, *pk_len);
274 * @pk: Buffer for PK (at least EAP_GPSK_MAX_PK_LEN bytes)
284 u8 *pk, size_t *pk_len)
322 pk, pk_len);
107 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) argument
188 eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument
278 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument
/freebsd-10.0-release/contrib/libpcap/
H A Ddlpisubs.c124 u_char *ep, *pk; local
166 pk = bufp + sizeof(*sbp);
173 pk = bufp;
177 if (bpf_filter(p->fcode.bf_insns, pk, origlen, caplen)) {
189 (*callback)(user, &pkthdr, pk);
/freebsd-10.0-release/contrib/wpa/src/tls/
H A Dtlsv1_common.c144 * @pk: Buffer for returning the allocated public key
151 int tls_parse_cert(const u8 *buf, size_t len, struct crypto_public_key **pk) argument
158 *pk = crypto_public_key_from_cert(buf, len);
159 if (*pk)
181 *pk = crypto_public_key_import(cert->public_key, cert->public_key_len);
184 if (*pk == NULL) {
/freebsd-10.0-release/crypto/openssl/crypto/pem/
H A Dpvkfmt.c484 static int do_i2b(unsigned char **out, EVP_PKEY *pk, int ispub) argument
489 if (pk->type == EVP_PKEY_DSA)
491 bitlen = check_bitlen_dsa(pk->pkey.dsa, ispub, &magic);
494 else if (pk->type == EVP_PKEY_RSA)
496 bitlen = check_bitlen_rsa(pk->pkey.rsa, ispub, &magic);
528 write_dsa(&p, pk->pkey.dsa, ispub);
530 write_rsa(&p, pk->pkey.rsa, ispub);
536 static int do_i2b_bio(BIO *out, EVP_PKEY *pk, int ispub) argument
540 outlen = do_i2b(&tmp, pk, ispub);
647 int i2b_PrivateKey_bio(BIO *out, EVP_PKEY *pk) argument
652 i2b_PublicKey_bio(BIO *out, EVP_PKEY *pk) argument
935 i2b_PVK_bio(BIO *out, EVP_PKEY *pk, int enclevel, pem_password_cb *cb, void *u) argument
[all...]
/freebsd-10.0-release/contrib/sendmail/contrib/
H A Detrn.pl254 (my $pk, my $file, my $line);
255 ($pk, $file, $line) = caller;
/freebsd-10.0-release/crypto/openssl/crypto/cms/
H A Dcms_env.c153 EVP_PKEY *pk = NULL; local
174 pk = X509_get_pubkey(recip);
175 if (!pk)
182 ktri->pkey = pk;
205 if (pk->ameth && pk->ameth->pkey_ctrl)
207 i = pk->ameth->pkey_ctrl(pk, ASN1_PKEY_CTRL_CMS_ENVELOPE,
238 EVP_PKEY **pk, X509 **recip,
251 if (pk)
237 CMS_RecipientInfo_ktri_get0_algs(CMS_RecipientInfo *ri, EVP_PKEY **pk, X509 **recip, X509_ALGOR **palg) argument
[all...]
/freebsd-10.0-release/contrib/telnet/libtelnet/
H A Dpk.c54 #include "pk.h"
164 MINT *pk = mp_itom(0); local
185 mp_pow(root, sk, modulus, pk);
188 xkey = mp_mtox(pk);
192 mp_mfree(pk);

Completed in 190 milliseconds

123