Searched refs:pk (Results 1 - 25 of 81) sorted by relevance

1234

/macosx-10.10/OpenSSL098-52/src/crypto/x509/
H A Dx509type.c67 EVP_PKEY *pk; local
73 pk=X509_get_pubkey(x);
75 pk=pkey;
77 if (pk == NULL) return(0);
79 switch (pk->type)
115 if (EVP_PKEY_size(pk) <= 1024/8)/* /8 because it's 1024 bits we look
118 if(pkey==NULL) EVP_PKEY_free(pk);
/macosx-10.10/OpenSSL098-52/src/crypto/x509v3/
H A Dv3_skey.c105 ASN1_BIT_STRING *pk; local
124 pk = ctx->subject_req->req_info->pubkey->public_key;
125 else pk = ctx->subject_cert->cert_info->key->public_key;
127 if(!pk) {
132 EVP_Digest(pk->data, pk->length, pkey_dig, &diglen, EVP_sha1(), NULL);
/macosx-10.10/zlib-55/zlib/contrib/blast/
H A DMakefile5 blast < test.pk | cmp - test.txt
/macosx-10.10/OpenSSL098-52/src/demos/x509/
H A Dmkreq.c63 EVP_PKEY *pk; local
68 if ((pk=EVP_PKEY_new()) == NULL)
75 if (!EVP_PKEY_assign_RSA(pk,rsa))
80 X509_REQ_set_pubkey(x,pk);
138 if (!X509_REQ_sign(x,pk,EVP_sha1()))
142 *pkeyp=pk;
H A Dmkcert.c64 EVP_PKEY *pk; local
70 if ((pk=EVP_PKEY_new()) == NULL)
77 pk= *pkeyp;
88 if (!EVP_PKEY_assign_RSA(pk,rsa))
99 X509_set_pubkey(x,pk);
139 if (!X509_sign(x,pk,EVP_sha1()))
143 *pkeyp=pk;
/macosx-10.10/Security-57031.1.35/Security/include/security_smime/
H A Dcryptohi.c122 SecPrivateKeyRef pk, SECOidTag digAlgTag, SECOidTag sigAlgTag)
141 rv = SecKeyGetCSPHandle(pk, &csp);
146 rv = SecKeyGetCSSMKey(pk, &key);
151 rv = SecKeyGetCredentials(pk, CSSM_ACL_AUTHORIZATION_SIGN, kSecCredentialTypeDefault, &accessCred);
181 SGN_Digest(SecPrivateKeyRef pk, SECOidTag digAlgTag, SECOidTag sigAlgTag, SECItem *result, SECItem *digest) argument
200 rv = SecKeyGetCSPHandle(pk, &csp);
205 rv = SecKeyGetCSSMKey(pk, &key);
210 rv = SecKeyGetCredentials(pk, CSSM_ACL_AUTHORIZATION_SIGN, kSecCredentialTypeDefault, &accessCred);
241 SecPublicKeyRef pk, SECItem *sig,
260 rv = SecKeyGetCSPHandle(pk,
121 SEC_SignData(SECItem *result, unsigned char *buf, int len, SecPrivateKeyRef pk, SECOidTag digAlgTag, SECOidTag sigAlgTag) argument
240 VFY_VerifyData(unsigned char *buf, int len, SecPublicKeyRef pk, SECItem *sig, SECOidTag digAlgTag, SECOidTag sigAlgTag, void *wincx) argument
281 VFY_VerifyDigest(SECItem *digest, SecPublicKeyRef pk, SECItem *sig, SECOidTag digAlgTag, SECOidTag sigAlgTag, void *wincx) argument
328 const CSSM_KEY *pk, *bk, *pubkey; local
456 const CSSM_KEY *pk; local
[all...]
/macosx-10.10/Security-57031.1.35/Security/libsecurity_smime/lib/
H A Dcryptohi.c122 SecPrivateKeyRef pk, SECOidTag digAlgTag, SECOidTag sigAlgTag)
141 rv = SecKeyGetCSPHandle(pk, &csp);
146 rv = SecKeyGetCSSMKey(pk, &key);
151 rv = SecKeyGetCredentials(pk, CSSM_ACL_AUTHORIZATION_SIGN, kSecCredentialTypeDefault, &accessCred);
181 SGN_Digest(SecPrivateKeyRef pk, SECOidTag digAlgTag, SECOidTag sigAlgTag, SECItem *result, SECItem *digest) argument
200 rv = SecKeyGetCSPHandle(pk, &csp);
205 rv = SecKeyGetCSSMKey(pk, &key);
210 rv = SecKeyGetCredentials(pk, CSSM_ACL_AUTHORIZATION_SIGN, kSecCredentialTypeDefault, &accessCred);
241 SecPublicKeyRef pk, SECItem *sig,
260 rv = SecKeyGetCSPHandle(pk,
121 SEC_SignData(SECItem *result, unsigned char *buf, int len, SecPrivateKeyRef pk, SECOidTag digAlgTag, SECOidTag sigAlgTag) argument
240 VFY_VerifyData(unsigned char *buf, int len, SecPublicKeyRef pk, SECItem *sig, SECOidTag digAlgTag, SECOidTag sigAlgTag, void *wincx) argument
281 VFY_VerifyDigest(SECItem *digest, SecPublicKeyRef pk, SECItem *sig, SECOidTag digAlgTag, SECOidTag sigAlgTag, void *wincx) argument
328 const CSSM_KEY *pk, *bk, *pubkey; local
456 const CSSM_KEY *pk; local
[all...]
/macosx-10.10/Security-57031.1.35/libsecurity_smime/Security/
H A Dcryptohi.c104 SecPrivateKeyRef pk, SECOidTag digAlgTag, SECOidTag sigAlgTag)
123 rv = SecKeyGetCSPHandle(pk, &csp);
128 rv = SecKeyGetCSSMKey(pk, &key);
133 rv = SecKeyGetCredentials(pk, CSSM_ACL_AUTHORIZATION_SIGN, kSecCredentialTypeDefault, &accessCred);
172 SGN_Digest(SecPrivateKeyRef pk, SECOidTag digAlgTag, SECOidTag sigAlgTag, SecAsn1Item *result, SecAsn1Item *digest) argument
191 rv = SecKeyGetCSPHandle(pk, &csp);
196 rv = SecKeyGetCSSMKey(pk, &key);
201 rv = SecKeyGetCredentials(pk, CSSM_ACL_AUTHORIZATION_SIGN, kSecCredentialTypeDefault, &accessCred);
241 SecPublicKeyRef pk, SecAsn1Item *sig,
260 rv = SecKeyGetCSPHandle(pk,
103 SEC_SignData(SecAsn1Item *result, unsigned char *buf, int len, SecPrivateKeyRef pk, SECOidTag digAlgTag, SECOidTag sigAlgTag) argument
240 VFY_VerifyData(unsigned char *buf, int len, SecPublicKeyRef pk, SecAsn1Item *sig, SECOidTag digAlgTag, SECOidTag sigAlgTag, void *wincx) argument
281 VFY_VerifyDigest(SecAsn1Item *digest, SecPublicKeyRef pk, SecAsn1Item *sig, SECOidTag digAlgTag, SECOidTag sigAlgTag, void *wincx) argument
328 const CSSM_KEY *pk, *bk, *pubkey; local
456 const CSSM_KEY *pk; local
[all...]
/macosx-10.10/Security-57031.1.35/libsecurity_smime/lib/
H A Dcryptohi.c104 SecPrivateKeyRef pk, SECOidTag digAlgTag, SECOidTag sigAlgTag)
123 rv = SecKeyGetCSPHandle(pk, &csp);
128 rv = SecKeyGetCSSMKey(pk, &key);
133 rv = SecKeyGetCredentials(pk, CSSM_ACL_AUTHORIZATION_SIGN, kSecCredentialTypeDefault, &accessCred);
172 SGN_Digest(SecPrivateKeyRef pk, SECOidTag digAlgTag, SECOidTag sigAlgTag, SecAsn1Item *result, SecAsn1Item *digest) argument
191 rv = SecKeyGetCSPHandle(pk, &csp);
196 rv = SecKeyGetCSSMKey(pk, &key);
201 rv = SecKeyGetCredentials(pk, CSSM_ACL_AUTHORIZATION_SIGN, kSecCredentialTypeDefault, &accessCred);
241 SecPublicKeyRef pk, SecAsn1Item *sig,
260 rv = SecKeyGetCSPHandle(pk,
103 SEC_SignData(SecAsn1Item *result, unsigned char *buf, int len, SecPrivateKeyRef pk, SECOidTag digAlgTag, SECOidTag sigAlgTag) argument
240 VFY_VerifyData(unsigned char *buf, int len, SecPublicKeyRef pk, SecAsn1Item *sig, SECOidTag digAlgTag, SECOidTag sigAlgTag, void *wincx) argument
281 VFY_VerifyDigest(SecAsn1Item *digest, SecPublicKeyRef pk, SecAsn1Item *sig, SECOidTag digAlgTag, SECOidTag sigAlgTag, void *wincx) argument
328 const CSSM_KEY *pk, *bk, *pubkey; local
456 const CSSM_KEY *pk; local
[all...]
/macosx-10.10/Security-57031.1.35/libsecurity_smime/security_smime/
H A Dcryptohi.c104 SecPrivateKeyRef pk, SECOidTag digAlgTag, SECOidTag sigAlgTag)
123 rv = SecKeyGetCSPHandle(pk, &csp);
128 rv = SecKeyGetCSSMKey(pk, &key);
133 rv = SecKeyGetCredentials(pk, CSSM_ACL_AUTHORIZATION_SIGN, kSecCredentialTypeDefault, &accessCred);
172 SGN_Digest(SecPrivateKeyRef pk, SECOidTag digAlgTag, SECOidTag sigAlgTag, SecAsn1Item *result, SecAsn1Item *digest) argument
191 rv = SecKeyGetCSPHandle(pk, &csp);
196 rv = SecKeyGetCSSMKey(pk, &key);
201 rv = SecKeyGetCredentials(pk, CSSM_ACL_AUTHORIZATION_SIGN, kSecCredentialTypeDefault, &accessCred);
241 SecPublicKeyRef pk, SecAsn1Item *sig,
260 rv = SecKeyGetCSPHandle(pk,
103 SEC_SignData(SecAsn1Item *result, unsigned char *buf, int len, SecPrivateKeyRef pk, SECOidTag digAlgTag, SECOidTag sigAlgTag) argument
240 VFY_VerifyData(unsigned char *buf, int len, SecPublicKeyRef pk, SecAsn1Item *sig, SECOidTag digAlgTag, SECOidTag sigAlgTag, void *wincx) argument
281 VFY_VerifyDigest(SecAsn1Item *digest, SecPublicKeyRef pk, SecAsn1Item *sig, SECOidTag digAlgTag, SECOidTag sigAlgTag, void *wincx) argument
328 const CSSM_KEY *pk, *bk, *pubkey; local
456 const CSSM_KEY *pk; local
[all...]
/macosx-10.10/OpenSSL098-52/src/demos/
H A Dspkigen.c123 X509_PUBKEY *pk; local
131 if ((pk=X509_PUBKEY_new()) == NULL) goto err;
132 a=pk->algor;
150 if (!ASN1_BIT_STRING_set(pk->public_key,s,i)) goto err;
154 x->spkac->pubkey=pk;
155 pk=NULL;
158 if (pk != NULL) X509_PUBKEY_free(pk);
H A Dselfsign.c75 EVP_PKEY *pk; local
84 if ((pk=EVP_PKEY_new()) == NULL)
91 pk= *pkeyp;
102 if (!EVP_PKEY_assign_RSA(pk,rsa))
113 X509_set_pubkey(x,pk);
172 if (!X509_sign(x,pk,EVP_md5()))
176 *pkeyp=pk;
/macosx-10.10/pyobjc-45/2.5/pyobjc/pyobjc-framework-Quartz/PyObjCTest/
H A Dtest_qccompositionparameterview.py5 def compositionParameterView_shouldDisplayParameterWithKey_attributes_(self, pv, pk, pa): return 1
/macosx-10.10/pyobjc-45/2.6/pyobjc/pyobjc-framework-Quartz/PyObjCTest/
H A Dtest_qccompositionparameterview.py5 def compositionParameterView_shouldDisplayParameterWithKey_attributes_(self, pv, pk, pa): return 1
/macosx-10.10/pyobjc-45/pyobjc/pyobjc-framework-Quartz-2.5.1/PyObjCTest/
H A Dtest_qccompositionparameterview.py5 def compositionParameterView_shouldDisplayParameterWithKey_attributes_(self, pv, pk, pa): return 1
/macosx-10.10/BerkeleyDB-21/db/perl/BerkeleyDB/t/
H A Ddb-3.3.t75 my ($k, $v, $pk) = ('','','');
116 ok 18, $primary->db_pget('red', $pk, $v) != 0 ;
119 ok 19, $secondary->db_pget('house', $pk, $v) == 0 ;
120 ok 20, $pk eq 'green';
140 ok 30, $p_cursor->c_pget($k, $pk, $v, DB_FIRST) != 0;
144 ok 31, $s_cursor->c_pget($k, $pk, $v, DB_SET) == 0;
146 ok 33, $pk eq 'red';
196 my ($k, $v, $pk) = ('','','');
261 my ($k, $v, $pk) = ('','','');
302 ok 63, $primary->db_pget(0, $pk,
[all...]
/macosx-10.10/BerkeleyDB-21/db/test/scr024/src/com/sleepycat/persist/test/
H A DForeignKeyTest.java189 assertEquals("pk2", o2.pk);
228 String pk; field in class:ForeignKeyTest.Entity1
235 Entity1(String pk, String sk) { argument
236 this.pk = pk;
243 return nullOrEqual(pk, o.pk) &&
252 String pk; field in class:ForeignKeyTest.Entity2
268 Entity2(String pk, String sk, DeleteAction action) { argument
269 this.pk
312 Entity3(String pk, String sk, DeleteAction action) argument
[all...]
/macosx-10.10/Heimdal-398.1.2/lib/hx509/
H A Dtest_windows.in63 --pk-init-principal="krbtgt/HEIMDAL.PKI@HEIMDAL.PKI" \
76 --pk-init-principal="user@HEIMDAL.PKI" \
/macosx-10.10/OpenSSL098-52/src/fips/dsa/
H A Dfips_dsa_key.c83 EVP_PKEY pk; local
85 pk.type = EVP_PKEY_DSA;
86 pk.pkey.dsa = dsa;
88 if (!fips_pkey_signature_test(&pk, tbs, -1,
H A Dfips_dsa_selftest.c124 EVP_PKEY pk; local
153 pk.type = EVP_PKEY_DSA;
154 pk.pkey.dsa = dsa;
160 if (!EVP_SignFinal(&mctx, buf, &slen, &pk))
167 if (EVP_VerifyFinal(&mctx, buf, slen, &pk) != 1)
H A Dfips_dssvs.c389 EVP_PKEY pk; local
402 pk.type = EVP_PKEY_DSA;
403 pk.pkey.dsa = dsa;
408 EVP_SignFinal(&mctx, sbuf, &slen, &pk);
477 EVP_PKEY pk; local
482 pk.type = EVP_PKEY_DSA;
483 pk.pkey.dsa = dsa;
493 r = EVP_VerifyFinal(&mctx, sigbuf, slen, &pk);
/macosx-10.10/OpenSSL098-52/src/fips/rsa/
H A Dfips_rsa_gen.c90 EVP_PKEY pk; local
91 pk.type = EVP_PKEY_RSA;
92 pk.pkey.rsa = rsa;
95 if (!fips_pkey_signature_test(&pk, tbs, -1,
97 || !fips_pkey_signature_test(&pk, tbs, -1,
99 || !fips_pkey_signature_test(&pk, tbs, -1,
/macosx-10.10/OpenSSL098-52/src/crypto/asn1/
H A Dx_pubkey.c90 X509_PUBKEY *pk=NULL;
98 if ((pk=X509_PUBKEY_new()) == NULL) goto err;
99 a=pk->algor;
231 if (!M_ASN1_BIT_STRING_set(pk->public_key,s,i))
237 pk->public_key->flags&= ~(ASN1_STRING_FLAG_BITS_LEFT|0x07);
238 pk->public_key->flags|=ASN1_STRING_FLAG_BITS_LEFT;
244 pk->pkey=pkey;
250 *x=pk;
254 if (pk != NULL) X509_PUBKEY_free(pk);
[all...]
/macosx-10.10/OpenSSH-189/osslshim/ossl/
H A Dossl-pem.c1213 X509_PUBKEY_free(SubjectPublicKeyInfo *pk) argument
1215 if (NULL == pk) {
1220 if (pk->algorithm.parameters != NULL) {
1222 if (pk->algorithm.parameters->data) {
1223 memset(pk->algorithm.parameters->data, 0,
1224 pk->algorithm.parameters->length);
1225 free(pk->algorithm.parameters->data);
1230 if (pk->subjectPublicKey.data != NULL) {
1231 memset(pk->subjectPublicKey.data, 0,
1232 pk
1243 SubjectPublicKeyInfo *pk; local
[all...]
/macosx-10.10/libpcap-48/libpcap/
H A Ddlpisubs.c130 u_char *ep, *pk; local
172 pk = bufp + sizeof(*sbp);
179 pk = bufp;
183 if (bpf_filter(p->fcode.bf_insns, pk, origlen, caplen)) {
195 (*callback)(user, &pkthdr, pk);

Completed in 297 milliseconds

1234