/macosx-10.10/xnu-2782.1.97/bsd/netinet6/ |
H A D | in6_cga.c | 90 const struct iovec *pubkey) 98 VERIFY(pubkey != NULL && pubkey->iov_base != NULL); 110 SHA1Update(&ctx, pubkey->iov_base, pubkey->iov_len); 125 const struct iovec *pubkey, u_int8_t collisions, struct in6_addr *in6) 132 VERIFY(pubkey != NULL && pubkey->iov_base != NULL); 139 SHA1Update(&ctx, pubkey->iov_base, pubkey 89 in6_cga_is_prepare_valid(const struct in6_cga_prepare *prepare, const struct iovec *pubkey) argument 124 in6_cga_generate_iid(const struct in6_cga_prepare *prepare, const struct iovec *pubkey, u_int8_t collisions, struct in6_addr *in6) argument 188 struct iovec privkey, pubkey; local 304 const struct iovec *pubkey; local [all...] |
/macosx-10.10/Security-57031.1.35/Security/sec/Security/ |
H A D | SecRSAKey.c | 134 ccrsa_pub_ctx_t pubkey; local 135 pubkey.pub = key->key; 136 cc_zero(ccrsa_pub_ctx_size(ccn_sizeof_n(ccrsa_ctx_n(pubkey))), pubkey.pub); 142 // pubkey is initilaized with an n which is the maximum it can hold 145 static int ccrsa_pub_init(ccrsa_pub_ctx_t pubkey, argument 152 if (nm > ccrsa_ctx_n(pubkey)) 155 ccrsa_ctx_n(pubkey) = nm; 157 ccn_read_uint(nm, ccrsa_ctx_m(pubkey), m_size, m); 158 cczp_init(ccrsa_ctx_zm(pubkey)); 164 ccrsa_pub_decode(ccrsa_pub_ctx_t pubkey, size_t pkcs1_size, const uint8_t* pkcs1) argument 187 ccrsa_pub_decode_apple(ccrsa_pub_ctx_t pubkey, size_t pkcs1_size, const uint8_t* pkcs1) argument 234 ccrsa_pub_ctx_t pubkey; local 283 ccrsa_pub_ctx_t pubkey; local 352 ccrsa_pub_ctx_t pubkey; local 446 ccrsa_pub_ctx_t pubkey; local 518 ccrsa_pub_ctx_t pubkey; local 525 SecRSAPublicKeyCreatePKCS1(CFAllocatorRef allocator, ccrsa_pub_ctx_t pubkey) argument 558 ccrsa_pub_ctx_t pubkey; local 579 ccrsa_pub_ctx_t pubkey; local 625 ccrsa_pub_ctx_t pubkey; local 644 ccrsa_pub_ctx_t pubkey; local [all...] |
H A D | SecECKey.c | 70 ccec_pub_ctx_t pubkey; local 71 pubkey.pub = key->key; 72 if (ccec_ctx_cp(pubkey).zp) 73 cc_zero(ccec_pub_ctx_size(ccn_sizeof_n(ccec_ctx_n(pubkey))), pubkey.pub); 122 ccec_pub_ctx_t pubkey; local 123 pubkey.pub = key->key; 138 err = (ccec_import_pub(cp, derKey->keyLength, derKey->key, pubkey) 145 err = (ccec_import_pub(cp, keyDataLength, keyData, pubkey) 156 memcpy(pubkey 174 ccec_pub_ctx_t pubkey; local 189 ccec_pub_ctx_t pubkey; local 204 ccec_pub_ctx_t pubkey; local 210 SecECPublicKeyExport(CFAllocatorRef allocator, ccec_pub_ctx_t pubkey) argument 224 ccec_pub_ctx_t pubkey; local 322 ccec_pub_ctx_t pubkey; local [all...] |
/macosx-10.10/OpenSSL098-52/src/crypto/asn1/ |
H A D | x_spki.c | 69 ASN1_SIMPLE(NETSCAPE_SPKAC, pubkey, X509_PUBKEY),
|
H A D | x_req.c | 96 ASN1_SIMPLE(X509_REQ_INFO, pubkey, X509_PUBKEY),
|
H A D | t_spki.c | 80 i=OBJ_obj2nid(spki->spkac->pubkey->algor->algorithm); 83 pkey = X509_PUBKEY_get(spki->spkac->pubkey);
|
/macosx-10.10/Heimdal-398.1.2/lib/hcrypto/ |
H A D | ec.c | 54 EC_POINT *pubkey; member in struct:EC_KEY 138 if (key->pubkey == NULL) 139 key->pubkey = EC_POINT_new(); 141 if (ec_point_mul(&key->pubkey, key->group, key->privkey) != 1)
|
/macosx-10.10/OpenSSL098-52/src/crypto/x509/ |
H A D | x509rset.c | 81 return(X509_PUBKEY_set(&x->req_info->pubkey,pkey));
|
H A D | x509spki.c | 66 return(X509_PUBKEY_set(&(x->spkac->pubkey),pkey)); 73 return(X509_PUBKEY_get(x->spkac->pubkey));
|
/macosx-10.10/bind9-45.101/bind9/lib/dns/ |
H A D | dnssec.c | 610 dst_key_t *pubkey = NULL; local 625 pubkey = NULL; 627 RETERR(dns_dnssec_keyfromrdata(name, &rdata, mctx, &pubkey)); 628 if (!is_zone_key(pubkey) || 629 (dst_key_flags(pubkey) & DNS_KEYTYPE_NOAUTH) != 0) 632 if (!dns_name_equal(name, dst_key_name(pubkey))) 635 result = dst_key_fromfile(dst_key_name(pubkey), 636 dst_key_id(pubkey), 637 dst_key_alg(pubkey), 649 flags = dst_key_flags(pubkey); 1436 dst_key_t *pubkey = NULL, *privkey = NULL; local [all...] |
H A D | dst_api.c | 460 dst_key_t *pubkey = NULL, *key = NULL; local 490 result = dst_key_read_public(newfilename, type, mctx, &pubkey); 497 (pubkey->key_flags & DNS_KEYFLAG_TYPEMASK) == DNS_KEYTYPE_NOKEY) { 498 result = computeid(pubkey); 500 dst_key_free(&pubkey); 504 *keyp = pubkey; 508 result = algorithm_status(pubkey->key_alg); 510 dst_key_free(&pubkey); 514 key = get_key_struct(pubkey->key_name, pubkey [all...] |
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/Security/ |
H A D | sslCrypto.c | 300 /* Extract the pubkey from a cert chain, and send it to the tls_handshake context */ 305 SecKeyRef pubkey = NULL; local 329 require_noerr((err=sslCopyPeerPubKey(certchain, &pubkey)), errOut); 332 algId = SecKeyGetAlgorithmID(pubkey); 334 algId = SecKeyGetAlgorithmId(pubkey); 342 require((modulus = SecKeyCopyModulus(pubkey)), errOut); 343 require((exponent = SecKeyCopyExponent(pubkey)), errOut); 359 tls_named_curve curve = SecECKeyGetNamedCurve(pubkey); 360 require((ecpubdata = SecECKeyCopyPublicBits(pubkey)), errOut); 375 CFReleaseSafe(pubkey); [all...] |
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/lib/ |
H A D | sslCrypto.c | 300 /* Extract the pubkey from a cert chain, and send it to the tls_handshake context */ 305 SecKeyRef pubkey = NULL; local 329 require_noerr((err=sslCopyPeerPubKey(certchain, &pubkey)), errOut); 332 algId = SecKeyGetAlgorithmID(pubkey); 334 algId = SecKeyGetAlgorithmId(pubkey); 342 require((modulus = SecKeyCopyModulus(pubkey)), errOut); 343 require((exponent = SecKeyCopyExponent(pubkey)), errOut); 359 tls_named_curve curve = SecECKeyGetNamedCurve(pubkey); 360 require((ecpubdata = SecECKeyCopyPublicBits(pubkey)), errOut); 375 CFReleaseSafe(pubkey); [all...] |
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/security_ssl/ |
H A D | sslCrypto.c | 300 /* Extract the pubkey from a cert chain, and send it to the tls_handshake context */ 305 SecKeyRef pubkey = NULL; local 329 require_noerr((err=sslCopyPeerPubKey(certchain, &pubkey)), errOut); 332 algId = SecKeyGetAlgorithmID(pubkey); 334 algId = SecKeyGetAlgorithmId(pubkey); 342 require((modulus = SecKeyCopyModulus(pubkey)), errOut); 343 require((exponent = SecKeyCopyExponent(pubkey)), errOut); 359 tls_named_curve curve = SecECKeyGetNamedCurve(pubkey); 360 require((ecpubdata = SecECKeyCopyPublicBits(pubkey)), errOut); 375 CFReleaseSafe(pubkey); [all...] |
/macosx-10.10/libresolv-57/ |
H A D | dst_api.c | 340 DST_KEY *dg_key = NULL, *pubkey = NULL; local 356 if ((pubkey = dst_s_read_public_key(keyname, in_id, in_alg)) == NULL) 360 return pubkey; 362 if (!(dg_key = dst_s_get_key_struct(keyname, pubkey->dk_alg, 363 pubkey->dk_flags, pubkey->dk_proto, 367 if (dst_s_read_private_key_file(keyname, dg_key, pubkey->dk_id, 368 pubkey->dk_alg) == 0) 371 pubkey = dst_free_key(pubkey); [all...] |
/macosx-10.10/OpenSSL098-52/src/demos/ |
H A D | spkigen.c | 153 X509_PUBKEY_free(x->spkac->pubkey); 154 x->spkac->pubkey=pk;
|
/macosx-10.10/OpenSSL098-52/src/crypto/x509v3/ |
H A D | v3_skey.c | 124 pk = ctx->subject_req->req_info->pubkey->public_key;
|
/macosx-10.10/OpenSSL098-52/src/apps/ |
H A D | spkac.c | 87 int verify=0,noout=0,pubkey=0; local 156 else if (strcmp(*argv,"-pubkey") == 0) 157 pubkey=1; 177 BIO_printf(bio_err," -pubkey output public key\n"); 295 if(pubkey) PEM_write_bio_PUBKEY(out, pkey);
|
/macosx-10.10/Security-57031.1.35/Security/include/security_smime/ |
H A D | cryptohi.c | 328 const CSSM_KEY *pk, *bk, *pubkey; local 347 pubkey = pk; 387 pubkey = &upk; 391 pubkey->KeyHeader.AlgorithmId, 393 pubkey,
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_smime/lib/ |
H A D | cryptohi.c | 328 const CSSM_KEY *pk, *bk, *pubkey; local 347 pubkey = pk; 387 pubkey = &upk; 391 pubkey->KeyHeader.AlgorithmId, 393 pubkey,
|
/macosx-10.10/Security-57031.1.35/libsecurity_smime/Security/ |
H A D | cryptohi.c | 328 const CSSM_KEY *pk, *bk, *pubkey; local 347 pubkey = pk; 387 pubkey = &upk; 391 pubkey->KeyHeader.AlgorithmId, 393 pubkey,
|
/macosx-10.10/Security-57031.1.35/libsecurity_smime/lib/ |
H A D | cryptohi.c | 328 const CSSM_KEY *pk, *bk, *pubkey; local 347 pubkey = pk; 387 pubkey = &upk; 391 pubkey->KeyHeader.AlgorithmId, 393 pubkey,
|
/macosx-10.10/Security-57031.1.35/libsecurity_smime/security_smime/ |
H A D | cryptohi.c | 328 const CSSM_KEY *pk, *bk, *pubkey; local 347 pubkey = pk; 387 pubkey = &upk; 391 pubkey->KeyHeader.AlgorithmId, 393 pubkey,
|
/macosx-10.10/Heimdal-398.1.2/appl/telnet/libtelnet/ |
H A D | rsaencpwd.c | 280 * get pubkey 323 char chalkey[160], pubkey[128], *ptr; local 362 memmove(pubkey, ptr, pubkey_len); 367 r = init_rsa_encpwd(&token, user_passwd, challenge, challenge_len, pubkey);
|
/macosx-10.10/libtelnet-13/ |
H A D | rsaencpwd.c | 280 * get pubkey 323 char chalkey[160], pubkey[128], *ptr; local 362 memmove(pubkey, ptr, pubkey_len); 367 r = init_rsa_encpwd(&token, user_passwd, challenge, challenge_len, pubkey);
|