/freebsd-10.2-release/crypto/openssl/crypto/asn1/ |
H A D | x_spki.c | 70 ASN1_SIMPLE(NETSCAPE_SPKAC, pubkey, X509_PUBKEY),
|
H A D | t_spki.c | 81 i = OBJ_obj2nid(spki->spkac->pubkey->algor->algorithm); 84 pkey = X509_PUBKEY_get(spki->spkac->pubkey);
|
H A D | x_req.c | 99 ASN1_SIMPLE(X509_REQ_INFO, pubkey, X509_PUBKEY),
|
H A D | x_pubkey.c | 76 X509_PUBKEY *pubkey = (X509_PUBKEY *)*pval; local 77 EVP_PKEY_free(pubkey->pkey);
|
/freebsd-10.2-release/contrib/wpa/src/wps/ |
H A D | wps_attr_build.c | 23 struct wpabuf *pubkey; local 32 pubkey = wpabuf_dup(wps->wps->dh_pubkey); 38 pubkey = wpabuf_dup(wps->wps->ap_nfc_dh_pubkey); 39 wps->dh_ctx = dh5_init_fixed(wps->dh_privkey, pubkey); 45 wps->dh_ctx = dh5_init(&wps->dh_privkey, &pubkey); 46 pubkey = wpabuf_zeropad(pubkey, 192); 48 if (wps->dh_ctx == NULL || wps->dh_privkey == NULL || pubkey == NULL) { 51 wpabuf_free(pubkey); 55 wpa_hexdump_buf(MSG_DEBUG, "WPS: DH own Public Key", pubkey); 351 wps_build_oob_dev_pw(struct wpabuf *msg, u16 dev_pw_id, const struct wpabuf *pubkey, const u8 *dev_pw, size_t dev_pw_len) argument [all...] |
H A D | wps_common.c | 61 struct wpabuf *pubkey, *dh_shared; local 72 pubkey = wps->registrar ? wps->dh_pubkey_e : wps->dh_pubkey_r; 73 if (pubkey == NULL) { 79 wpa_hexdump_buf(MSG_DEBUG, "WPS: DH peer Public Key", pubkey); 80 dh_shared = dh5_derive_shared(wps->dh_ctx, pubkey, wps->dh_privkey); 355 const struct wpabuf *pubkey, 365 wps_build_oob_dev_pw(data, dev_pw_id, pubkey, 565 struct wpabuf * wps_nfc_token_gen(int ndef, int *id, struct wpabuf **pubkey, argument 592 wpabuf_free(*pubkey); 593 *pubkey 354 wps_build_nfc_pw_token(u16 dev_pw_id, const struct wpabuf *pubkey, const struct wpabuf *dev_pw) argument [all...] |
H A D | wps.h | 811 const struct wpabuf *pubkey, 813 struct wpabuf * wps_nfc_token_gen(int ndef, int *id, struct wpabuf **pubkey,
|
/freebsd-10.2-release/crypto/openssl/crypto/x509/ |
H A D | x509rset.c | 84 return (X509_PUBKEY_set(&x->req_info->pubkey, pkey));
|
H A D | x509spki.c | 68 return (X509_PUBKEY_set(&(x->spkac->pubkey), pkey)); 75 return (X509_PUBKEY_get(x->spkac->pubkey));
|
/freebsd-10.2-release/contrib/unbound/validator/ |
H A D | val_secalgo.c | 844 nss_setup_key_digest(int algo, SECKEYPublicKey** pubkey, HASH_HashType* htype, argument 870 *pubkey = nss_buf2dsa(key, keylen); 871 if(!*pubkey) { 886 *pubkey = nss_buf2rsa(key, keylen); 887 if(!*pubkey) { 914 *pubkey = nss_buf2rsa(key, keylen); 915 if(!*pubkey) { 926 *pubkey = nss_buf2ecdsa(key, keylen, 928 if(!*pubkey) { 936 *pubkey 978 SECKEYPublicKey* pubkey = NULL; local [all...] |
/freebsd-10.2-release/contrib/ldns/ |
H A D | keys.c | 1377 ldns_rr *pubkey; local 1393 pubkey = ldns_rr_new(); 1399 ldns_rr_set_type(pubkey, LDNS_RR_TYPE_KEY); 1402 ldns_rr_set_type(pubkey, LDNS_RR_TYPE_DNSKEY); 1406 ldns_rr_push_rdf(pubkey, 1410 ldns_rr_push_rdf(pubkey, 1414 ldns_rr_set_owner(pubkey, ldns_rdf_clone(ldns_key_pubkey_owner(k))); 1424 ldns_rr_push_rdf(pubkey, 1431 ldns_rr_free(pubkey); 1436 ldns_rr_free(pubkey); [all...] |
/freebsd-10.2-release/crypto/openssl/crypto/x509v3/ |
H A D | v3_skey.c | 127 pk = ctx->subject_req->req_info->pubkey->public_key;
|
/freebsd-10.2-release/crypto/openssl/crypto/ec/ |
H A D | ec_pmeth.c | 170 const EC_POINT *pubkey = NULL; local 183 pubkey = EC_KEY_get0_public_key(ctx->peerkey->pkey.ec); 192 ret = ECDH_compute_key(key, outlen, pubkey, ctx->pkey->pkey.ec, 0);
|
H A D | ec_ameth.c | 180 static int eckey_pub_decode(EVP_PKEY *pkey, X509_PUBKEY *pubkey) argument 188 if (!X509_PUBKEY_get0_param(NULL, &p, &pklen, &palg, pubkey))
|
/freebsd-10.2-release/crypto/openssl/apps/ |
H A D | spkac.c | 88 int verify = 0, noout = 0, pubkey = 0; local 151 else if (strcmp(*argv, "-pubkey") == 0) 152 pubkey = 1; 174 BIO_printf(bio_err, " -pubkey output public key\n"); 297 if (pubkey)
|
H A D | x509.c | 118 " -pubkey - output the public key\n", 198 int x509req = 0, days = DEF_DAYS, modulus = 0, pubkey = 0; local 388 else if (strcmp(*argv, "-pubkey") == 0) 389 pubkey = ++num; 558 (req->req_info->pubkey == NULL) || 559 (req->req_info->pubkey->public_key == NULL) || 560 (req->req_info->pubkey->public_key->data == NULL)) { 762 } else if (pubkey == i) {
|
/freebsd-10.2-release/usr.sbin/pkg/ |
H A D | pkg.c | 68 struct pubkey { struct 588 static struct pubkey * 591 struct pubkey *pk; 608 pk = calloc(1, sizeof(struct pubkey)); 692 struct pubkey *pk; 693 const char *pubkey; local 697 pubkey = NULL; 699 if (config_string(PUBKEY, &pubkey) != 0) { 710 printf("Verifying signature with public key %s... ", pubkey); 711 if (rsa_verify_cert(fd_pkg, pubkey, NUL [all...] |
/freebsd-10.2-release/crypto/heimdal/appl/telnet/libtelnet/ |
H A D | rsaencpwd.c | 280 * get pubkey 323 char chalkey[160], pubkey[128], *ptr; local 362 memmove(pubkey, ptr, pubkey_len); 367 r = init_rsa_encpwd(&token, user_passwd, challenge, challenge_len, pubkey);
|
/freebsd-10.2-release/contrib/telnet/libtelnet/ |
H A D | rsaencpwd.c | 280 * get pubkey 323 char chalkey[160], pubkey[128], *ptr; local 362 memmove(pubkey, ptr, pubkey_len); 367 r = init_rsa_encpwd(&token, user_passwd, challenge, challenge_len, pubkey);
|
/freebsd-10.2-release/secure/usr.sbin/sshd/ |
H A D | Makefile | 12 auth2-none.c auth2-passwd.c auth2-pubkey.c \
|
/freebsd-10.2-release/contrib/wpa/src/crypto/ |
H A D | crypto_openssl.c | 463 struct wpabuf *pubkey = NULL, *privkey = NULL; local 485 pubkey = wpabuf_alloc(publen); 486 if (pubkey == NULL) 493 BN_bn2bin(dh->pub_key, wpabuf_put(pubkey, publen)); 497 *publ = pubkey; 501 wpabuf_free(pubkey);
|
/freebsd-10.2-release/crypto/openssl/engines/ccgost/ |
H A D | gost_ameth.c | 383 BIGNUM *pubkey; local 385 pubkey = ((DSA *)EVP_PKEY_get0((EVP_PKEY *)pkey))->pub_key; 388 BN_print(out, pubkey); 436 const EC_POINT *pubkey; local 446 pubkey = 449 if (!EC_POINT_get_affine_coordinates_GFp(group, pubkey, X, Y, ctx)) {
|
/freebsd-10.2-release/crypto/openssh/ |
H A D | sshd.c | 1418 Key *pubkey; local 1723 pubkey = key_load_public(options.host_key_files[i], NULL); 1725 sensitive_data.host_pubkeys[i] = pubkey; 1727 if (key == NULL && pubkey != NULL && pubkey->type != KEY_RSA1 && 1731 keytype = pubkey->type; 1755 key_type(key ? key : pubkey)); 2478 sshd_hostkey_sign(Key *privkey, Key *pubkey, u_char **signature, u_int *slen, argument 2485 if (mm_key_sign(pubkey, signature, slen, data, dlen) < 0) 2488 if (ssh_agent_sign(auth_conn, pubkey, signatur [all...] |
/freebsd-10.2-release/crypto/openssl/engines/ |
H A D | e_capi.c | 603 unsigned char *pubkey = NULL; local 615 pubkey = OPENSSL_malloc(len); 617 if (!pubkey) 620 if (!CryptExportKey(key->key, 0, PUBLICKEYBLOB, 0, pubkey, &len)) { 626 bh = (BLOBHEADER *) pubkey; 724 if (pubkey) 725 OPENSSL_free(pubkey);
|
/freebsd-10.2-release/crypto/openssl/crypto/dh/ |
H A D | dh_ameth.c | 72 static int dh_pub_decode(EVP_PKEY *pkey, X509_PUBKEY *pubkey) argument 84 if (!X509_PUBKEY_get0_param(NULL, &p, &pklen, &palg, pubkey)) 178 * explcitly included and the pubkey must be recalculated.
|