/freebsd-11-stable/crypto/openssl/crypto/dsa/ |
H A D | dsa_prn.c | 99 EVP_PKEY *pk; local 101 pk = EVP_PKEY_new(); 102 if (!pk || !EVP_PKEY_set1_DSA(pk, (DSA *)x)) 104 ret = EVP_PKEY_print_private(bp, pk, off, NULL); 105 EVP_PKEY_free(pk); 111 EVP_PKEY *pk; local 113 pk = EVP_PKEY_new(); 114 if (!pk || !EVP_PKEY_set1_DSA(pk, (DS [all...] |
/freebsd-11-stable/crypto/openssl/crypto/rsa/ |
H A D | rsa_prn.c | 84 EVP_PKEY *pk; local 86 pk = EVP_PKEY_new(); 87 if (!pk || !EVP_PKEY_set1_RSA(pk, (RSA *)x)) 89 ret = EVP_PKEY_print_private(bp, pk, off, NULL); 90 EVP_PKEY_free(pk);
|
/freebsd-11-stable/crypto/openssl/crypto/x509/ |
H A D | x509type.c | 67 EVP_PKEY *pk; local 74 pk = X509_get_pubkey(x); 76 pk = pkey; 78 if (pk == NULL) 81 switch (pk->type) { 125 EVP_PKEY_free(pk);
|
H A D | x509_cmp.c | 400 EVP_PKEY *pk = NULL; local 419 pk = X509_get_pubkey(x); 421 rv = check_suite_b(pk, -1, &tflags); 434 EVP_PKEY_free(pk); 435 pk = X509_get_pubkey(x); 436 rv = check_suite_b(pk, sign_nid, &tflags); 442 rv = check_suite_b(pk, X509_get_signature_nid(x), &tflags); 444 if (pk) 445 EVP_PKEY_free(pk); 463 int X509_CRL_check_suiteb(X509_CRL *crl, EVP_PKEY *pk, unsigne argument 479 X509_CRL_check_suiteb(X509_CRL *crl, EVP_PKEY *pk, unsigned long flags) argument [all...] |
/freebsd-11-stable/crypto/openssl/crypto/x509v3/ |
H A D | v3_skey.c | 106 ASN1_BIT_STRING *pk; local 127 pk = ctx->subject_req->req_info->pubkey->public_key; 129 pk = ctx->subject_cert->cert_info->key->public_key; 131 if (!pk) { 137 (pk->data, pk->length, pkey_dig, &diglen, EVP_sha1(), NULL))
|
/freebsd-11-stable/crypto/openssh/ |
H A D | ed25519.c | 14 static void get_hram(unsigned char *hram, const unsigned char *sm, const unsigned char *pk, unsigned char *playground, unsigned long long smlen) argument 19 for (i = 32;i < 64;++i) playground[i] = pk[i-32]; 27 unsigned char *pk, 45 ge25519_pack(pk, &gepk); 47 sk[32 + i] = pk[i]; 106 const unsigned char *pk 119 if (ge25519_unpackneg_vartime(&get1, pk)) return -1; 121 get_hram(hram,sm,pk,m,smlen); 26 crypto_sign_ed25519_keypair( unsigned char *pk, unsigned char *sk ) argument
|
/freebsd-11-stable/crypto/openssl/crypto/asn1/ |
H A D | asn1_locl.h | 83 int (*pub_decode) (EVP_PKEY *pk, X509_PUBKEY *pub); 84 int (*pub_encode) (X509_PUBKEY *pub, const EVP_PKEY *pk); 88 int (*priv_decode) (EVP_PKEY *pk, PKCS8_PRIV_KEY_INFO *p8inf); 89 int (*priv_encode) (PKCS8_PRIV_KEY_INFO *p8, const EVP_PKEY *pk); 92 int (*pkey_size) (const EVP_PKEY *pk); 93 int (*pkey_bits) (const EVP_PKEY *pk); 97 int (*param_missing) (const EVP_PKEY *pk); 134 int (*crl_verify) (X509_CRL *crl, EVP_PKEY *pk);
|
H A D | p8_pkey.c | 123 const unsigned char **pk, int *ppklen, 130 if (pk) { 131 *pk = p8->pkey->value.octet_string->data; 136 if (pk) { 137 *pk = p8->pkey->value.sequence->data;
|
H A D | x_pubkey.c | 91 X509_PUBKEY *pk = NULL; 96 if ((pk = X509_PUBKEY_new()) == NULL) 101 if (!pkey->ameth->pub_encode(pk, pkey)) { 118 *x = pk; 122 if (pk != NULL) 123 X509_PUBKEY_free(pk); 362 const unsigned char **pk, int *ppklen, 367 if (pk) { 368 *pk = pub->public_key->data;
|
/freebsd-11-stable/usr.bin/newkey/ |
H A D | generic.c | 82 MINT *pk = mp_itom(0); local 103 mp_pow(root, sk, modulus, pk); 106 xkey = mp_mtox(pk); 110 mp_mfree(pk);
|
/freebsd-11-stable/crypto/openssl/crypto/ec/ |
H A D | eck_prn.c | 119 EVP_PKEY *pk; local 121 pk = EVP_PKEY_new(); 122 if (!pk || !EVP_PKEY_set1_EC_KEY(pk, (EC_KEY *)x)) 124 ret = EVP_PKEY_print_private(bp, pk, off, NULL); 125 EVP_PKEY_free(pk); 131 EVP_PKEY *pk; local 133 pk = EVP_PKEY_new(); 134 if (!pk || !EVP_PKEY_set1_EC_KEY(pk, (EC_KE [all...] |
/freebsd-11-stable/contrib/wpa/src/tls/ |
H A D | pkcs1.h | 24 int pkcs1_v15_sig_ver(struct crypto_public_key *pk,
|
H A D | tlsv1_common.c | 156 * @pk: Buffer for returning the allocated public key 163 int tls_parse_cert(const u8 *buf, size_t len, struct crypto_public_key **pk) argument 170 *pk = crypto_public_key_from_cert(buf, len); 171 if (*pk) 193 *pk = crypto_public_key_import(cert->public_key, cert->public_key_len); 196 if (*pk == NULL) { 414 int tls_verify_signature(u16 tls_version, struct crypto_public_key *pk, argument 441 if (pk == NULL) { 453 if (crypto_public_key_decrypt_pkcs1(pk, pos, end - pos, buf, &buflen) <
|
/freebsd-11-stable/crypto/heimdal/lib/hx509/ |
H A D | test_windows.in | 63 --pk-init-principal="krbtgt/HEIMDAL.PKI@HEIMDAL.PKI" \ 76 --pk-init-principal="user@HEIMDAL.PKI" \
|
/freebsd-11-stable/crypto/openssl/engines/ccgost/ |
H A D | gost_ameth.c | 297 static int priv_decode_gost(EVP_PKEY *pk, PKCS8_PRIV_KEY_INFO *p8inf) argument 310 if (!decode_gost_algor_params(pk, palg)) { 339 ret = gost_set_priv_key(pk, pk_num); 345 static int priv_encode_gost(PKCS8_PRIV_KEY_INFO *p8, const EVP_PKEY *pk) argument 347 ASN1_OBJECT *algobj = OBJ_nid2obj(EVP_PKEY_base_id(pk)); 348 ASN1_STRING *params = encode_gost_algor_params(pk); 356 asn1key = BN_to_ASN1_INTEGER(gost_get0_priv_key(pk), NULL); 498 static int param_missing_gost94(const EVP_PKEY *pk) argument 500 const DSA *dsa = EVP_PKEY_get0((EVP_PKEY *)pk); 508 static int param_missing_gost01(const EVP_PKEY *pk) argument 599 pub_decode_gost94(EVP_PKEY *pk, X509_PUBKEY *pub) argument 635 pub_encode_gost94(X509_PUBKEY *pub, const EVP_PKEY *pk) argument 670 pub_decode_gost01(EVP_PKEY *pk, X509_PUBKEY *pub) argument 728 pub_encode_gost01(X509_PUBKEY *pub, const EVP_PKEY *pk) argument 825 pkey_size_gost(const EVP_PKEY *pk) argument 830 pkey_bits_gost(const EVP_PKEY *pk) argument 836 mackey_free_gost(EVP_PKEY *pk) argument [all...] |
/freebsd-11-stable/crypto/openssl/apps/ |
H A D | dsa.c | 328 EVP_PKEY *pk; local 329 pk = EVP_PKEY_new(); 330 if (pk == NULL) 333 EVP_PKEY_set1_DSA(pk, dsa); 335 i = i2b_PVK_bio(out, pk, pvk_encr, 0, passout); 337 i = i2b_PublicKey_bio(out, pk); 339 i = i2b_PrivateKey_bio(out, pk); 340 EVP_PKEY_free(pk);
|
H A D | rsa.c | 397 EVP_PKEY *pk; local 398 pk = EVP_PKEY_new(); 399 EVP_PKEY_set1_RSA(pk, rsa); 401 i = i2b_PVK_bio(out, pk, pvk_encr, 0, passout); 403 i = i2b_PublicKey_bio(out, pk); 405 i = i2b_PrivateKey_bio(out, pk); 406 EVP_PKEY_free(pk);
|
/freebsd-11-stable/contrib/wpa/src/crypto/ |
H A D | crypto_libtomcrypt.c | 423 struct crypto_public_key *pk; local 425 pk = os_zalloc(sizeof(*pk)); 426 if (pk == NULL) 429 res = rsa_import(key, len, &pk->rsa); 434 os_free(pk); 438 if (pk->rsa.type != PK_PUBLIC) { 441 rsa_free(&pk->rsa); 442 os_free(pk); 446 return pk; 455 struct crypto_private_key *pk; local [all...] |
/freebsd-11-stable/contrib/unbound/validator/ |
H A D | val_secalgo.c | 941 SECKEYPublicKey* pk; local 977 pk = nss_key_create(ecKey); 978 if(!pk) 980 pk->u.ec.size = (len/2)*8; 981 if(SECITEM_CopyItem(pk->arena, &pk->u.ec.publicValue, &pub)) { 982 SECKEY_DestroyPublicKey(pk); 985 if(SECITEM_CopyItem(pk->arena, &pk->u.ec.DEREncodedParams, ¶ms)) { 986 SECKEY_DestroyPublicKey(pk); 996 SECKEYPublicKey* pk; local 1058 SECKEYPublicKey* pk; local [all...] |
/freebsd-11-stable/lib/libtelnet/ |
H A D | Makefile | 20 SRCS+= encrypt.c auth.c enc_des.c sra.c pk.c
|
/freebsd-11-stable/crypto/openssl/crypto/cms/ |
H A D | cms_kari.c | 206 int CMS_RecipientInfo_kari_set0_pkey(CMS_RecipientInfo *ri, EVP_PKEY *pk) argument 214 if (!pk) 216 pctx = EVP_PKEY_CTX_new(pk, NULL); 314 EVP_PKEY *pk) 319 pctx = EVP_PKEY_CTX_new(pk, NULL); 345 EVP_PKEY *pk, unsigned int flags) 378 if (!cms_kari_create_ephemeral_key(kari, pk)) 381 CRYPTO_add(&pk->references, 1, CRYPTO_LOCK_EVP_PKEY); 382 rek->pkey = pk; 313 cms_kari_create_ephemeral_key(CMS_KeyAgreeRecipientInfo *kari, EVP_PKEY *pk) argument 344 cms_RecipientInfo_kari_init(CMS_RecipientInfo *ri, X509 *recip, EVP_PKEY *pk, unsigned int flags) argument
|
H A D | cms_env.c | 182 EVP_PKEY *pk, unsigned int flags) 211 CRYPTO_add(&pk->references, 1, CRYPTO_LOCK_EVP_PKEY); 212 ktri->pkey = pk; 235 EVP_PKEY *pk = NULL; local 245 pk = X509_get_pubkey(recip); 246 if (!pk) { 251 switch (cms_pkey_get_ri_type(pk)) { 254 if (!cms_RecipientInfo_ktri_init(ri, recip, pk, flags)) 259 if (!cms_RecipientInfo_kari_init(ri, recip, pk, flags)) 273 EVP_PKEY_free(pk); 181 cms_RecipientInfo_ktri_init(CMS_RecipientInfo *ri, X509 *recip, EVP_PKEY *pk, unsigned int flags) argument 288 CMS_RecipientInfo_ktri_get0_algs(CMS_RecipientInfo *ri, EVP_PKEY **pk, X509 **recip, X509_ALGOR **palg) argument 981 cms_pkey_get_ri_type(EVP_PKEY *pk) argument [all...] |
/freebsd-11-stable/contrib/libpcap/ |
H A D | dlpisubs.c | 126 u_char *ep, *pk; local 168 pk = bufp + sizeof(*sbp); 175 pk = bufp; 179 if (bpf_filter(p->fcode.bf_insns, pk, origlen, caplen)) { 191 (*callback)(user, &pkthdr, pk);
|
/freebsd-11-stable/crypto/openssl/crypto/pem/ |
H A D | pvkfmt.c | 468 static int do_i2b(unsigned char **out, EVP_PKEY *pk, int ispub) argument 473 if (pk->type == EVP_PKEY_DSA) { 474 bitlen = check_bitlen_dsa(pk->pkey.dsa, ispub, &magic); 476 } else if (pk->type == EVP_PKEY_RSA) { 477 bitlen = check_bitlen_rsa(pk->pkey.rsa, ispub, &magic); 507 write_dsa(&p, pk->pkey.dsa, ispub); 509 write_rsa(&p, pk->pkey.rsa, ispub); 515 static int do_i2b_bio(BIO *out, EVP_PKEY *pk, int ispub) argument 519 outlen = do_i2b(&tmp, pk, ispub); 617 int i2b_PrivateKey_bio(BIO *out, EVP_PKEY *pk) argument 622 i2b_PublicKey_bio(BIO *out, EVP_PKEY *pk) argument 800 i2b_PVK(unsigned char **out, EVP_PKEY *pk, int enclevel, pem_password_cb *cb, void *u) argument 878 i2b_PVK_bio(BIO *out, EVP_PKEY *pk, int enclevel, pem_password_cb *cb, void *u) argument [all...] |
/freebsd-11-stable/contrib/sendmail/contrib/ |
H A D | etrn.pl | 254 (my $pk, my $file, my $line); 255 ($pk, $file, $line) = caller;
|