Searched refs:pk (Results 1 - 25 of 86) sorted by relevance

1234

/freebsd-11-stable/crypto/openssl/crypto/dsa/
H A Ddsa_prn.c99 EVP_PKEY *pk; local
101 pk = EVP_PKEY_new();
102 if (!pk || !EVP_PKEY_set1_DSA(pk, (DSA *)x))
104 ret = EVP_PKEY_print_private(bp, pk, off, NULL);
105 EVP_PKEY_free(pk);
111 EVP_PKEY *pk; local
113 pk = EVP_PKEY_new();
114 if (!pk || !EVP_PKEY_set1_DSA(pk, (DS
[all...]
/freebsd-11-stable/crypto/openssl/crypto/rsa/
H A Drsa_prn.c84 EVP_PKEY *pk; local
86 pk = EVP_PKEY_new();
87 if (!pk || !EVP_PKEY_set1_RSA(pk, (RSA *)x))
89 ret = EVP_PKEY_print_private(bp, pk, off, NULL);
90 EVP_PKEY_free(pk);
/freebsd-11-stable/crypto/openssl/crypto/x509/
H A Dx509type.c67 EVP_PKEY *pk; local
74 pk = X509_get_pubkey(x);
76 pk = pkey;
78 if (pk == NULL)
81 switch (pk->type) {
125 EVP_PKEY_free(pk);
H A Dx509_cmp.c400 EVP_PKEY *pk = NULL; local
419 pk = X509_get_pubkey(x);
421 rv = check_suite_b(pk, -1, &tflags);
434 EVP_PKEY_free(pk);
435 pk = X509_get_pubkey(x);
436 rv = check_suite_b(pk, sign_nid, &tflags);
442 rv = check_suite_b(pk, X509_get_signature_nid(x), &tflags);
444 if (pk)
445 EVP_PKEY_free(pk);
463 int X509_CRL_check_suiteb(X509_CRL *crl, EVP_PKEY *pk, unsigne argument
479 X509_CRL_check_suiteb(X509_CRL *crl, EVP_PKEY *pk, unsigned long flags) argument
[all...]
/freebsd-11-stable/crypto/openssl/crypto/x509v3/
H A Dv3_skey.c106 ASN1_BIT_STRING *pk; local
127 pk = ctx->subject_req->req_info->pubkey->public_key;
129 pk = ctx->subject_cert->cert_info->key->public_key;
131 if (!pk) {
137 (pk->data, pk->length, pkey_dig, &diglen, EVP_sha1(), NULL))
/freebsd-11-stable/crypto/openssh/
H A Ded25519.c14 static void get_hram(unsigned char *hram, const unsigned char *sm, const unsigned char *pk, unsigned char *playground, unsigned long long smlen) argument
19 for (i = 32;i < 64;++i) playground[i] = pk[i-32];
27 unsigned char *pk,
45 ge25519_pack(pk, &gepk);
47 sk[32 + i] = pk[i];
106 const unsigned char *pk
119 if (ge25519_unpackneg_vartime(&get1, pk)) return -1;
121 get_hram(hram,sm,pk,m,smlen);
26 crypto_sign_ed25519_keypair( unsigned char *pk, unsigned char *sk ) argument
/freebsd-11-stable/crypto/openssl/crypto/asn1/
H A Dasn1_locl.h83 int (*pub_decode) (EVP_PKEY *pk, X509_PUBKEY *pub);
84 int (*pub_encode) (X509_PUBKEY *pub, const EVP_PKEY *pk);
88 int (*priv_decode) (EVP_PKEY *pk, PKCS8_PRIV_KEY_INFO *p8inf);
89 int (*priv_encode) (PKCS8_PRIV_KEY_INFO *p8, const EVP_PKEY *pk);
92 int (*pkey_size) (const EVP_PKEY *pk);
93 int (*pkey_bits) (const EVP_PKEY *pk);
97 int (*param_missing) (const EVP_PKEY *pk);
134 int (*crl_verify) (X509_CRL *crl, EVP_PKEY *pk);
H A Dp8_pkey.c123 const unsigned char **pk, int *ppklen,
130 if (pk) {
131 *pk = p8->pkey->value.octet_string->data;
136 if (pk) {
137 *pk = p8->pkey->value.sequence->data;
H A Dx_pubkey.c91 X509_PUBKEY *pk = NULL;
96 if ((pk = X509_PUBKEY_new()) == NULL)
101 if (!pkey->ameth->pub_encode(pk, pkey)) {
118 *x = pk;
122 if (pk != NULL)
123 X509_PUBKEY_free(pk);
362 const unsigned char **pk, int *ppklen,
367 if (pk) {
368 *pk = pub->public_key->data;
/freebsd-11-stable/usr.bin/newkey/
H A Dgeneric.c82 MINT *pk = mp_itom(0); local
103 mp_pow(root, sk, modulus, pk);
106 xkey = mp_mtox(pk);
110 mp_mfree(pk);
/freebsd-11-stable/crypto/openssl/crypto/ec/
H A Deck_prn.c119 EVP_PKEY *pk; local
121 pk = EVP_PKEY_new();
122 if (!pk || !EVP_PKEY_set1_EC_KEY(pk, (EC_KEY *)x))
124 ret = EVP_PKEY_print_private(bp, pk, off, NULL);
125 EVP_PKEY_free(pk);
131 EVP_PKEY *pk; local
133 pk = EVP_PKEY_new();
134 if (!pk || !EVP_PKEY_set1_EC_KEY(pk, (EC_KE
[all...]
/freebsd-11-stable/contrib/wpa/src/tls/
H A Dpkcs1.h24 int pkcs1_v15_sig_ver(struct crypto_public_key *pk,
H A Dtlsv1_common.c156 * @pk: Buffer for returning the allocated public key
163 int tls_parse_cert(const u8 *buf, size_t len, struct crypto_public_key **pk) argument
170 *pk = crypto_public_key_from_cert(buf, len);
171 if (*pk)
193 *pk = crypto_public_key_import(cert->public_key, cert->public_key_len);
196 if (*pk == NULL) {
414 int tls_verify_signature(u16 tls_version, struct crypto_public_key *pk, argument
441 if (pk == NULL) {
453 if (crypto_public_key_decrypt_pkcs1(pk, pos, end - pos, buf, &buflen) <
/freebsd-11-stable/crypto/heimdal/lib/hx509/
H A Dtest_windows.in63 --pk-init-principal="krbtgt/HEIMDAL.PKI@HEIMDAL.PKI" \
76 --pk-init-principal="user@HEIMDAL.PKI" \
/freebsd-11-stable/crypto/openssl/engines/ccgost/
H A Dgost_ameth.c297 static int priv_decode_gost(EVP_PKEY *pk, PKCS8_PRIV_KEY_INFO *p8inf) argument
310 if (!decode_gost_algor_params(pk, palg)) {
339 ret = gost_set_priv_key(pk, pk_num);
345 static int priv_encode_gost(PKCS8_PRIV_KEY_INFO *p8, const EVP_PKEY *pk) argument
347 ASN1_OBJECT *algobj = OBJ_nid2obj(EVP_PKEY_base_id(pk));
348 ASN1_STRING *params = encode_gost_algor_params(pk);
356 asn1key = BN_to_ASN1_INTEGER(gost_get0_priv_key(pk), NULL);
498 static int param_missing_gost94(const EVP_PKEY *pk) argument
500 const DSA *dsa = EVP_PKEY_get0((EVP_PKEY *)pk);
508 static int param_missing_gost01(const EVP_PKEY *pk) argument
599 pub_decode_gost94(EVP_PKEY *pk, X509_PUBKEY *pub) argument
635 pub_encode_gost94(X509_PUBKEY *pub, const EVP_PKEY *pk) argument
670 pub_decode_gost01(EVP_PKEY *pk, X509_PUBKEY *pub) argument
728 pub_encode_gost01(X509_PUBKEY *pub, const EVP_PKEY *pk) argument
825 pkey_size_gost(const EVP_PKEY *pk) argument
830 pkey_bits_gost(const EVP_PKEY *pk) argument
836 mackey_free_gost(EVP_PKEY *pk) argument
[all...]
/freebsd-11-stable/crypto/openssl/apps/
H A Ddsa.c328 EVP_PKEY *pk; local
329 pk = EVP_PKEY_new();
330 if (pk == NULL)
333 EVP_PKEY_set1_DSA(pk, dsa);
335 i = i2b_PVK_bio(out, pk, pvk_encr, 0, passout);
337 i = i2b_PublicKey_bio(out, pk);
339 i = i2b_PrivateKey_bio(out, pk);
340 EVP_PKEY_free(pk);
H A Drsa.c397 EVP_PKEY *pk; local
398 pk = EVP_PKEY_new();
399 EVP_PKEY_set1_RSA(pk, rsa);
401 i = i2b_PVK_bio(out, pk, pvk_encr, 0, passout);
403 i = i2b_PublicKey_bio(out, pk);
405 i = i2b_PrivateKey_bio(out, pk);
406 EVP_PKEY_free(pk);
/freebsd-11-stable/contrib/wpa/src/crypto/
H A Dcrypto_libtomcrypt.c423 struct crypto_public_key *pk; local
425 pk = os_zalloc(sizeof(*pk));
426 if (pk == NULL)
429 res = rsa_import(key, len, &pk->rsa);
434 os_free(pk);
438 if (pk->rsa.type != PK_PUBLIC) {
441 rsa_free(&pk->rsa);
442 os_free(pk);
446 return pk;
455 struct crypto_private_key *pk; local
[all...]
/freebsd-11-stable/contrib/unbound/validator/
H A Dval_secalgo.c941 SECKEYPublicKey* pk; local
977 pk = nss_key_create(ecKey);
978 if(!pk)
980 pk->u.ec.size = (len/2)*8;
981 if(SECITEM_CopyItem(pk->arena, &pk->u.ec.publicValue, &pub)) {
982 SECKEY_DestroyPublicKey(pk);
985 if(SECITEM_CopyItem(pk->arena, &pk->u.ec.DEREncodedParams, &params)) {
986 SECKEY_DestroyPublicKey(pk);
996 SECKEYPublicKey* pk; local
1058 SECKEYPublicKey* pk; local
[all...]
/freebsd-11-stable/lib/libtelnet/
H A DMakefile20 SRCS+= encrypt.c auth.c enc_des.c sra.c pk.c
/freebsd-11-stable/crypto/openssl/crypto/cms/
H A Dcms_kari.c206 int CMS_RecipientInfo_kari_set0_pkey(CMS_RecipientInfo *ri, EVP_PKEY *pk) argument
214 if (!pk)
216 pctx = EVP_PKEY_CTX_new(pk, NULL);
314 EVP_PKEY *pk)
319 pctx = EVP_PKEY_CTX_new(pk, NULL);
345 EVP_PKEY *pk, unsigned int flags)
378 if (!cms_kari_create_ephemeral_key(kari, pk))
381 CRYPTO_add(&pk->references, 1, CRYPTO_LOCK_EVP_PKEY);
382 rek->pkey = pk;
313 cms_kari_create_ephemeral_key(CMS_KeyAgreeRecipientInfo *kari, EVP_PKEY *pk) argument
344 cms_RecipientInfo_kari_init(CMS_RecipientInfo *ri, X509 *recip, EVP_PKEY *pk, unsigned int flags) argument
H A Dcms_env.c182 EVP_PKEY *pk, unsigned int flags)
211 CRYPTO_add(&pk->references, 1, CRYPTO_LOCK_EVP_PKEY);
212 ktri->pkey = pk;
235 EVP_PKEY *pk = NULL; local
245 pk = X509_get_pubkey(recip);
246 if (!pk) {
251 switch (cms_pkey_get_ri_type(pk)) {
254 if (!cms_RecipientInfo_ktri_init(ri, recip, pk, flags))
259 if (!cms_RecipientInfo_kari_init(ri, recip, pk, flags))
273 EVP_PKEY_free(pk);
181 cms_RecipientInfo_ktri_init(CMS_RecipientInfo *ri, X509 *recip, EVP_PKEY *pk, unsigned int flags) argument
288 CMS_RecipientInfo_ktri_get0_algs(CMS_RecipientInfo *ri, EVP_PKEY **pk, X509 **recip, X509_ALGOR **palg) argument
981 cms_pkey_get_ri_type(EVP_PKEY *pk) argument
[all...]
/freebsd-11-stable/contrib/libpcap/
H A Ddlpisubs.c126 u_char *ep, *pk; local
168 pk = bufp + sizeof(*sbp);
175 pk = bufp;
179 if (bpf_filter(p->fcode.bf_insns, pk, origlen, caplen)) {
191 (*callback)(user, &pkthdr, pk);
/freebsd-11-stable/crypto/openssl/crypto/pem/
H A Dpvkfmt.c468 static int do_i2b(unsigned char **out, EVP_PKEY *pk, int ispub) argument
473 if (pk->type == EVP_PKEY_DSA) {
474 bitlen = check_bitlen_dsa(pk->pkey.dsa, ispub, &magic);
476 } else if (pk->type == EVP_PKEY_RSA) {
477 bitlen = check_bitlen_rsa(pk->pkey.rsa, ispub, &magic);
507 write_dsa(&p, pk->pkey.dsa, ispub);
509 write_rsa(&p, pk->pkey.rsa, ispub);
515 static int do_i2b_bio(BIO *out, EVP_PKEY *pk, int ispub) argument
519 outlen = do_i2b(&tmp, pk, ispub);
617 int i2b_PrivateKey_bio(BIO *out, EVP_PKEY *pk) argument
622 i2b_PublicKey_bio(BIO *out, EVP_PKEY *pk) argument
800 i2b_PVK(unsigned char **out, EVP_PKEY *pk, int enclevel, pem_password_cb *cb, void *u) argument
878 i2b_PVK_bio(BIO *out, EVP_PKEY *pk, int enclevel, pem_password_cb *cb, void *u) argument
[all...]
/freebsd-11-stable/contrib/sendmail/contrib/
H A Detrn.pl254 (my $pk, my $file, my $line);
255 ($pk, $file, $line) = caller;

Completed in 852 milliseconds

1234