/macosx-10.10/OpenSSL098-52/src/crypto/x509/ |
H A D | x509type.c | 67 EVP_PKEY *pk; local 73 pk=X509_get_pubkey(x); 75 pk=pkey; 77 if (pk == NULL) return(0); 79 switch (pk->type) 115 if (EVP_PKEY_size(pk) <= 1024/8)/* /8 because it's 1024 bits we look 118 if(pkey==NULL) EVP_PKEY_free(pk);
|
/macosx-10.10/OpenSSL098-52/src/crypto/x509v3/ |
H A D | v3_skey.c | 105 ASN1_BIT_STRING *pk; local 124 pk = ctx->subject_req->req_info->pubkey->public_key; 125 else pk = ctx->subject_cert->cert_info->key->public_key; 127 if(!pk) { 132 EVP_Digest(pk->data, pk->length, pkey_dig, &diglen, EVP_sha1(), NULL);
|
/macosx-10.10/zlib-55/zlib/contrib/blast/ |
H A D | Makefile | 5 blast < test.pk | cmp - test.txt
|
/macosx-10.10/OpenSSL098-52/src/demos/x509/ |
H A D | mkreq.c | 63 EVP_PKEY *pk; local 68 if ((pk=EVP_PKEY_new()) == NULL) 75 if (!EVP_PKEY_assign_RSA(pk,rsa)) 80 X509_REQ_set_pubkey(x,pk); 138 if (!X509_REQ_sign(x,pk,EVP_sha1())) 142 *pkeyp=pk;
|
H A D | mkcert.c | 64 EVP_PKEY *pk; local 70 if ((pk=EVP_PKEY_new()) == NULL) 77 pk= *pkeyp; 88 if (!EVP_PKEY_assign_RSA(pk,rsa)) 99 X509_set_pubkey(x,pk); 139 if (!X509_sign(x,pk,EVP_sha1())) 143 *pkeyp=pk;
|
/macosx-10.10/Security-57031.1.35/Security/include/security_smime/ |
H A D | cryptohi.c | 122 SecPrivateKeyRef pk, SECOidTag digAlgTag, SECOidTag sigAlgTag) 141 rv = SecKeyGetCSPHandle(pk, &csp); 146 rv = SecKeyGetCSSMKey(pk, &key); 151 rv = SecKeyGetCredentials(pk, CSSM_ACL_AUTHORIZATION_SIGN, kSecCredentialTypeDefault, &accessCred); 181 SGN_Digest(SecPrivateKeyRef pk, SECOidTag digAlgTag, SECOidTag sigAlgTag, SECItem *result, SECItem *digest) argument 200 rv = SecKeyGetCSPHandle(pk, &csp); 205 rv = SecKeyGetCSSMKey(pk, &key); 210 rv = SecKeyGetCredentials(pk, CSSM_ACL_AUTHORIZATION_SIGN, kSecCredentialTypeDefault, &accessCred); 241 SecPublicKeyRef pk, SECItem *sig, 260 rv = SecKeyGetCSPHandle(pk, 121 SEC_SignData(SECItem *result, unsigned char *buf, int len, SecPrivateKeyRef pk, SECOidTag digAlgTag, SECOidTag sigAlgTag) argument 240 VFY_VerifyData(unsigned char *buf, int len, SecPublicKeyRef pk, SECItem *sig, SECOidTag digAlgTag, SECOidTag sigAlgTag, void *wincx) argument 281 VFY_VerifyDigest(SECItem *digest, SecPublicKeyRef pk, SECItem *sig, SECOidTag digAlgTag, SECOidTag sigAlgTag, void *wincx) argument 328 const CSSM_KEY *pk, *bk, *pubkey; local 456 const CSSM_KEY *pk; local [all...] |
/macosx-10.10/Security-57031.1.35/Security/libsecurity_smime/lib/ |
H A D | cryptohi.c | 122 SecPrivateKeyRef pk, SECOidTag digAlgTag, SECOidTag sigAlgTag) 141 rv = SecKeyGetCSPHandle(pk, &csp); 146 rv = SecKeyGetCSSMKey(pk, &key); 151 rv = SecKeyGetCredentials(pk, CSSM_ACL_AUTHORIZATION_SIGN, kSecCredentialTypeDefault, &accessCred); 181 SGN_Digest(SecPrivateKeyRef pk, SECOidTag digAlgTag, SECOidTag sigAlgTag, SECItem *result, SECItem *digest) argument 200 rv = SecKeyGetCSPHandle(pk, &csp); 205 rv = SecKeyGetCSSMKey(pk, &key); 210 rv = SecKeyGetCredentials(pk, CSSM_ACL_AUTHORIZATION_SIGN, kSecCredentialTypeDefault, &accessCred); 241 SecPublicKeyRef pk, SECItem *sig, 260 rv = SecKeyGetCSPHandle(pk, 121 SEC_SignData(SECItem *result, unsigned char *buf, int len, SecPrivateKeyRef pk, SECOidTag digAlgTag, SECOidTag sigAlgTag) argument 240 VFY_VerifyData(unsigned char *buf, int len, SecPublicKeyRef pk, SECItem *sig, SECOidTag digAlgTag, SECOidTag sigAlgTag, void *wincx) argument 281 VFY_VerifyDigest(SECItem *digest, SecPublicKeyRef pk, SECItem *sig, SECOidTag digAlgTag, SECOidTag sigAlgTag, void *wincx) argument 328 const CSSM_KEY *pk, *bk, *pubkey; local 456 const CSSM_KEY *pk; local [all...] |
/macosx-10.10/Security-57031.1.35/libsecurity_smime/Security/ |
H A D | cryptohi.c | 104 SecPrivateKeyRef pk, SECOidTag digAlgTag, SECOidTag sigAlgTag) 123 rv = SecKeyGetCSPHandle(pk, &csp); 128 rv = SecKeyGetCSSMKey(pk, &key); 133 rv = SecKeyGetCredentials(pk, CSSM_ACL_AUTHORIZATION_SIGN, kSecCredentialTypeDefault, &accessCred); 172 SGN_Digest(SecPrivateKeyRef pk, SECOidTag digAlgTag, SECOidTag sigAlgTag, SecAsn1Item *result, SecAsn1Item *digest) argument 191 rv = SecKeyGetCSPHandle(pk, &csp); 196 rv = SecKeyGetCSSMKey(pk, &key); 201 rv = SecKeyGetCredentials(pk, CSSM_ACL_AUTHORIZATION_SIGN, kSecCredentialTypeDefault, &accessCred); 241 SecPublicKeyRef pk, SecAsn1Item *sig, 260 rv = SecKeyGetCSPHandle(pk, 103 SEC_SignData(SecAsn1Item *result, unsigned char *buf, int len, SecPrivateKeyRef pk, SECOidTag digAlgTag, SECOidTag sigAlgTag) argument 240 VFY_VerifyData(unsigned char *buf, int len, SecPublicKeyRef pk, SecAsn1Item *sig, SECOidTag digAlgTag, SECOidTag sigAlgTag, void *wincx) argument 281 VFY_VerifyDigest(SecAsn1Item *digest, SecPublicKeyRef pk, SecAsn1Item *sig, SECOidTag digAlgTag, SECOidTag sigAlgTag, void *wincx) argument 328 const CSSM_KEY *pk, *bk, *pubkey; local 456 const CSSM_KEY *pk; local [all...] |
/macosx-10.10/Security-57031.1.35/libsecurity_smime/lib/ |
H A D | cryptohi.c | 104 SecPrivateKeyRef pk, SECOidTag digAlgTag, SECOidTag sigAlgTag) 123 rv = SecKeyGetCSPHandle(pk, &csp); 128 rv = SecKeyGetCSSMKey(pk, &key); 133 rv = SecKeyGetCredentials(pk, CSSM_ACL_AUTHORIZATION_SIGN, kSecCredentialTypeDefault, &accessCred); 172 SGN_Digest(SecPrivateKeyRef pk, SECOidTag digAlgTag, SECOidTag sigAlgTag, SecAsn1Item *result, SecAsn1Item *digest) argument 191 rv = SecKeyGetCSPHandle(pk, &csp); 196 rv = SecKeyGetCSSMKey(pk, &key); 201 rv = SecKeyGetCredentials(pk, CSSM_ACL_AUTHORIZATION_SIGN, kSecCredentialTypeDefault, &accessCred); 241 SecPublicKeyRef pk, SecAsn1Item *sig, 260 rv = SecKeyGetCSPHandle(pk, 103 SEC_SignData(SecAsn1Item *result, unsigned char *buf, int len, SecPrivateKeyRef pk, SECOidTag digAlgTag, SECOidTag sigAlgTag) argument 240 VFY_VerifyData(unsigned char *buf, int len, SecPublicKeyRef pk, SecAsn1Item *sig, SECOidTag digAlgTag, SECOidTag sigAlgTag, void *wincx) argument 281 VFY_VerifyDigest(SecAsn1Item *digest, SecPublicKeyRef pk, SecAsn1Item *sig, SECOidTag digAlgTag, SECOidTag sigAlgTag, void *wincx) argument 328 const CSSM_KEY *pk, *bk, *pubkey; local 456 const CSSM_KEY *pk; local [all...] |
/macosx-10.10/Security-57031.1.35/libsecurity_smime/security_smime/ |
H A D | cryptohi.c | 104 SecPrivateKeyRef pk, SECOidTag digAlgTag, SECOidTag sigAlgTag) 123 rv = SecKeyGetCSPHandle(pk, &csp); 128 rv = SecKeyGetCSSMKey(pk, &key); 133 rv = SecKeyGetCredentials(pk, CSSM_ACL_AUTHORIZATION_SIGN, kSecCredentialTypeDefault, &accessCred); 172 SGN_Digest(SecPrivateKeyRef pk, SECOidTag digAlgTag, SECOidTag sigAlgTag, SecAsn1Item *result, SecAsn1Item *digest) argument 191 rv = SecKeyGetCSPHandle(pk, &csp); 196 rv = SecKeyGetCSSMKey(pk, &key); 201 rv = SecKeyGetCredentials(pk, CSSM_ACL_AUTHORIZATION_SIGN, kSecCredentialTypeDefault, &accessCred); 241 SecPublicKeyRef pk, SecAsn1Item *sig, 260 rv = SecKeyGetCSPHandle(pk, 103 SEC_SignData(SecAsn1Item *result, unsigned char *buf, int len, SecPrivateKeyRef pk, SECOidTag digAlgTag, SECOidTag sigAlgTag) argument 240 VFY_VerifyData(unsigned char *buf, int len, SecPublicKeyRef pk, SecAsn1Item *sig, SECOidTag digAlgTag, SECOidTag sigAlgTag, void *wincx) argument 281 VFY_VerifyDigest(SecAsn1Item *digest, SecPublicKeyRef pk, SecAsn1Item *sig, SECOidTag digAlgTag, SECOidTag sigAlgTag, void *wincx) argument 328 const CSSM_KEY *pk, *bk, *pubkey; local 456 const CSSM_KEY *pk; local [all...] |
/macosx-10.10/OpenSSL098-52/src/demos/ |
H A D | spkigen.c | 123 X509_PUBKEY *pk; local 131 if ((pk=X509_PUBKEY_new()) == NULL) goto err; 132 a=pk->algor; 150 if (!ASN1_BIT_STRING_set(pk->public_key,s,i)) goto err; 154 x->spkac->pubkey=pk; 155 pk=NULL; 158 if (pk != NULL) X509_PUBKEY_free(pk);
|
H A D | selfsign.c | 75 EVP_PKEY *pk; local 84 if ((pk=EVP_PKEY_new()) == NULL) 91 pk= *pkeyp; 102 if (!EVP_PKEY_assign_RSA(pk,rsa)) 113 X509_set_pubkey(x,pk); 172 if (!X509_sign(x,pk,EVP_md5())) 176 *pkeyp=pk;
|
/macosx-10.10/pyobjc-45/2.5/pyobjc/pyobjc-framework-Quartz/PyObjCTest/ |
H A D | test_qccompositionparameterview.py | 5 def compositionParameterView_shouldDisplayParameterWithKey_attributes_(self, pv, pk, pa): return 1
|
/macosx-10.10/pyobjc-45/2.6/pyobjc/pyobjc-framework-Quartz/PyObjCTest/ |
H A D | test_qccompositionparameterview.py | 5 def compositionParameterView_shouldDisplayParameterWithKey_attributes_(self, pv, pk, pa): return 1
|
/macosx-10.10/pyobjc-45/pyobjc/pyobjc-framework-Quartz-2.5.1/PyObjCTest/ |
H A D | test_qccompositionparameterview.py | 5 def compositionParameterView_shouldDisplayParameterWithKey_attributes_(self, pv, pk, pa): return 1
|
/macosx-10.10/BerkeleyDB-21/db/perl/BerkeleyDB/t/ |
H A D | db-3.3.t | 75 my ($k, $v, $pk) = ('','',''); 116 ok 18, $primary->db_pget('red', $pk, $v) != 0 ; 119 ok 19, $secondary->db_pget('house', $pk, $v) == 0 ; 120 ok 20, $pk eq 'green'; 140 ok 30, $p_cursor->c_pget($k, $pk, $v, DB_FIRST) != 0; 144 ok 31, $s_cursor->c_pget($k, $pk, $v, DB_SET) == 0; 146 ok 33, $pk eq 'red'; 196 my ($k, $v, $pk) = ('','',''); 261 my ($k, $v, $pk) = ('','',''); 302 ok 63, $primary->db_pget(0, $pk, [all...] |
/macosx-10.10/BerkeleyDB-21/db/test/scr024/src/com/sleepycat/persist/test/ |
H A D | ForeignKeyTest.java | 189 assertEquals("pk2", o2.pk); 228 String pk; field in class:ForeignKeyTest.Entity1 235 Entity1(String pk, String sk) { argument 236 this.pk = pk; 243 return nullOrEqual(pk, o.pk) && 252 String pk; field in class:ForeignKeyTest.Entity2 268 Entity2(String pk, String sk, DeleteAction action) { argument 269 this.pk 312 Entity3(String pk, String sk, DeleteAction action) argument [all...] |
/macosx-10.10/Heimdal-398.1.2/lib/hx509/ |
H A D | test_windows.in | 63 --pk-init-principal="krbtgt/HEIMDAL.PKI@HEIMDAL.PKI" \ 76 --pk-init-principal="user@HEIMDAL.PKI" \
|
/macosx-10.10/OpenSSL098-52/src/fips/dsa/ |
H A D | fips_dsa_key.c | 83 EVP_PKEY pk; local 85 pk.type = EVP_PKEY_DSA; 86 pk.pkey.dsa = dsa; 88 if (!fips_pkey_signature_test(&pk, tbs, -1,
|
H A D | fips_dsa_selftest.c | 124 EVP_PKEY pk; local 153 pk.type = EVP_PKEY_DSA; 154 pk.pkey.dsa = dsa; 160 if (!EVP_SignFinal(&mctx, buf, &slen, &pk)) 167 if (EVP_VerifyFinal(&mctx, buf, slen, &pk) != 1)
|
H A D | fips_dssvs.c | 389 EVP_PKEY pk; local 402 pk.type = EVP_PKEY_DSA; 403 pk.pkey.dsa = dsa; 408 EVP_SignFinal(&mctx, sbuf, &slen, &pk); 477 EVP_PKEY pk; local 482 pk.type = EVP_PKEY_DSA; 483 pk.pkey.dsa = dsa; 493 r = EVP_VerifyFinal(&mctx, sigbuf, slen, &pk);
|
/macosx-10.10/OpenSSL098-52/src/fips/rsa/ |
H A D | fips_rsa_gen.c | 90 EVP_PKEY pk; local 91 pk.type = EVP_PKEY_RSA; 92 pk.pkey.rsa = rsa; 95 if (!fips_pkey_signature_test(&pk, tbs, -1, 97 || !fips_pkey_signature_test(&pk, tbs, -1, 99 || !fips_pkey_signature_test(&pk, tbs, -1,
|
/macosx-10.10/OpenSSL098-52/src/crypto/asn1/ |
H A D | x_pubkey.c | 90 X509_PUBKEY *pk=NULL; 98 if ((pk=X509_PUBKEY_new()) == NULL) goto err; 99 a=pk->algor; 231 if (!M_ASN1_BIT_STRING_set(pk->public_key,s,i)) 237 pk->public_key->flags&= ~(ASN1_STRING_FLAG_BITS_LEFT|0x07); 238 pk->public_key->flags|=ASN1_STRING_FLAG_BITS_LEFT; 244 pk->pkey=pkey; 250 *x=pk; 254 if (pk != NULL) X509_PUBKEY_free(pk); [all...] |
/macosx-10.10/OpenSSH-189/osslshim/ossl/ |
H A D | ossl-pem.c | 1213 X509_PUBKEY_free(SubjectPublicKeyInfo *pk) argument 1215 if (NULL == pk) { 1220 if (pk->algorithm.parameters != NULL) { 1222 if (pk->algorithm.parameters->data) { 1223 memset(pk->algorithm.parameters->data, 0, 1224 pk->algorithm.parameters->length); 1225 free(pk->algorithm.parameters->data); 1230 if (pk->subjectPublicKey.data != NULL) { 1231 memset(pk->subjectPublicKey.data, 0, 1232 pk 1243 SubjectPublicKeyInfo *pk; local [all...] |
/macosx-10.10/libpcap-48/libpcap/ |
H A D | dlpisubs.c | 130 u_char *ep, *pk; local 172 pk = bufp + sizeof(*sbp); 179 pk = bufp; 183 if (bpf_filter(p->fcode.bf_insns, pk, origlen, caplen)) { 195 (*callback)(user, &pkthdr, pk);
|