/netbsd-6-1-5-RELEASE/crypto/external/cpl/trousers/dist/src/tspi/ |
H A D | tsp_daa.c | 28 Trspi_LoadBlob_DAA_PK(UINT64 *offset, BYTE *blob, TSS_DAA_PK *pk) argument 32 Trspi_LoadBlob_TSS_VERSION(offset, blob, pk->versionInfo); 34 Trspi_LoadBlob_UINT32(offset, pk->modulusLength, blob); 35 Trspi_LoadBlob(offset, pk->modulusLength, blob, pk->modulus); 37 Trspi_LoadBlob_UINT32(offset, pk->capitalSLength, blob); 38 Trspi_LoadBlob(offset, pk->capitalSLength, blob, pk->capitalS); 40 Trspi_LoadBlob_UINT32(offset, pk->capitalZLength, blob); 41 Trspi_LoadBlob(offset, pk 68 Trspi_UnloadBlob_DAA_PK(UINT64 *offset, BYTE *blob, TSS_DAA_PK *pk) argument [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/dsa/ |
H A D | dsa_prn.c | 100 EVP_PKEY *pk; local 102 pk = EVP_PKEY_new(); 103 if (!pk || !EVP_PKEY_set1_DSA(pk, (DSA *)x)) 105 ret = EVP_PKEY_print_private(bp, pk, off, NULL); 106 EVP_PKEY_free(pk); 112 EVP_PKEY *pk; local 114 pk = EVP_PKEY_new(); 115 if (!pk || !EVP_PKEY_set1_DSA(pk, (DS [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/rsa/ |
H A D | rsa_prn.c | 84 EVP_PKEY *pk; local 86 pk = EVP_PKEY_new(); 87 if (!pk || !EVP_PKEY_set1_RSA(pk, (RSA *)x)) 89 ret = EVP_PKEY_print_private(bp, pk, off, NULL); 90 EVP_PKEY_free(pk);
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/x509/ |
H A D | x509type.c | 67 EVP_PKEY *pk; local 73 pk=X509_get_pubkey(x); 75 pk=pkey; 77 if (pk == NULL) return(0); 79 switch (pk->type) 125 if (EVP_PKEY_size(pk) <= 1024/8)/* /8 because it's 1024 bits we look 128 if(pkey==NULL) EVP_PKEY_free(pk);
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/asn1/ |
H A D | asn1_locl.h | 83 int (*pub_decode)(EVP_PKEY *pk, X509_PUBKEY *pub); 84 int (*pub_encode)(X509_PUBKEY *pub, const EVP_PKEY *pk); 89 int (*priv_decode)(EVP_PKEY *pk, PKCS8_PRIV_KEY_INFO *p8inf); 90 int (*priv_encode)(PKCS8_PRIV_KEY_INFO *p8, const EVP_PKEY *pk); 94 int (*pkey_size)(const EVP_PKEY *pk); 95 int (*pkey_bits)(const EVP_PKEY *pk); 100 int (*param_missing)(const EVP_PKEY *pk); 144 int (*crl_verify)(X509_CRL *crl, EVP_PKEY *pk);
|
H A D | p8_pkey.c | 125 const unsigned char **pk, int *ppklen, 134 if (pk) 136 *pk = p8->pkey->value.octet_string->data; 143 if (pk) 145 *pk = p8->pkey->value.sequence->data;
|
H A D | x_pubkey.c | 92 X509_PUBKEY *pk=NULL; 96 if ((pk=X509_PUBKEY_new()) == NULL) goto error; 102 if (!pkey->ameth->pub_encode(pk, pkey)) 125 *x=pk; 129 if (pk != NULL) X509_PUBKEY_free(pk); 371 const unsigned char **pk, int *ppklen, 377 if (pk) 379 *pk = pub->public_key->data;
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/x509v3/ |
H A D | v3_skey.c | 105 ASN1_BIT_STRING *pk; local 124 pk = ctx->subject_req->req_info->pubkey->public_key; 125 else pk = ctx->subject_cert->cert_info->key->public_key; 127 if(!pk) { 132 if (!EVP_Digest(pk->data, pk->length, pkey_dig, &diglen, EVP_sha1(), NULL))
|
/netbsd-6-1-5-RELEASE/common/dist/zlib/contrib/blast/ |
H A D | Makefile | 5 blast < test.pk | cmp - test.txt
|
/netbsd-6-1-5-RELEASE/external/gpl3/gcc/dist/gcc/testsuite/gcc.dg/ipa/ |
H A D | modif-1.c | 21 int *pk = &k; local 30 func4 (pk);
|
/netbsd-6-1-5-RELEASE/external/gpl3/gcc/dist/zlib/contrib/blast/ |
H A D | Makefile | 5 blast < test.pk | cmp - test.txt
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/demos/x509/ |
H A D | mkreq.c | 63 EVP_PKEY *pk; local 68 if ((pk=EVP_PKEY_new()) == NULL) 75 if (!EVP_PKEY_assign_RSA(pk,rsa)) 80 X509_REQ_set_pubkey(x,pk); 138 if (!X509_REQ_sign(x,pk,EVP_sha1())) 142 *pkeyp=pk;
|
H A D | mkcert.c | 64 EVP_PKEY *pk; local 70 if ((pk=EVP_PKEY_new()) == NULL) 77 pk= *pkeyp; 88 if (!EVP_PKEY_assign_RSA(pk,rsa)) 99 X509_set_pubkey(x,pk); 139 if (!X509_sign(x,pk,EVP_sha1())) 143 *pkeyp=pk;
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/demos/ |
H A D | spkigen.c | 123 X509_PUBKEY *pk; local 131 if ((pk=X509_PUBKEY_new()) == NULL) goto err; 132 a=pk->algor; 150 if (!ASN1_BIT_STRING_set(pk->public_key,s,i)) goto err; 154 x->spkac->pubkey=pk; 155 pk=NULL; 158 if (pk != NULL) X509_PUBKEY_free(pk);
|
H A D | selfsign.c | 75 EVP_PKEY *pk; local 84 if ((pk=EVP_PKEY_new()) == NULL) 91 pk= *pkeyp; 102 if (!EVP_PKEY_assign_RSA(pk,rsa)) 113 X509_set_pubkey(x,pk); 172 if (!X509_sign(x,pk,EVP_md5())) 176 *pkeyp=pk;
|
/netbsd-6-1-5-RELEASE/lib/libtelnet/ |
H A D | Makefile | 30 SRCS+= sra.c pk.c 35 .for f in auth enc_des kerberos5 pk
|
/netbsd-6-1-5-RELEASE/crypto/external/cpl/trousers/dist/src/tspi/daa/ |
H A D | daa_structs.c | 37 dump_field( pk->field##Length, pk->field); \ 44 store_bi( &pk->field##Length, &pk->field, bi); \ 49 store_bi( &pk->field##Length,\ 50 &pk->field,\ 361 save_DAA_PK_internal( file, key_pair_with_proof->pk); 374 key_pair_with_proof->pk = load_DAA_PK_internal(file); 395 result->public_key = i_2_e_TSS_DAA_PK( key_pair_with_proof->pk, daa_alloc, param_alloc); 575 encoded_DAA_PK_internal(int *result_length, const TSS_DAA_PK_internal *pk) argument 663 TSS_DAA_PK *pk; local 722 e_2_i_TSS_DAA_PK( TSS_DAA_PK *pk) argument 794 free_TSS_DAA_PK(TSS_DAA_PK *pk) argument [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/ec/ |
H A D | eck_prn.c | 122 EVP_PKEY *pk; local 124 pk = EVP_PKEY_new(); 125 if (!pk || !EVP_PKEY_set1_EC_KEY(pk, (EC_KEY *)x)) 127 ret = EVP_PKEY_print_private(bp, pk, off, NULL); 128 EVP_PKEY_free(pk); 134 EVP_PKEY *pk; local 136 pk = EVP_PKEY_new(); 137 if (!pk || !EVP_PKEY_set1_EC_KEY(pk, (EC_KE [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/hx509/ |
H A D | test_windows.in | 63 --pk-init-principal="krbtgt/HEIMDAL.PKI@HEIMDAL.PKI" \ 76 --pk-init-principal="user@HEIMDAL.PKI" \
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/engines/ccgost/ |
H A D | gost_ameth.c | 309 static int priv_decode_gost( EVP_PKEY *pk, PKCS8_PRIV_KEY_INFO *p8inf) argument 322 if (!decode_gost_algor_params(pk,palg)) 359 ret= gost_set_priv_key(pk,pk_num); 365 static int priv_encode_gost(PKCS8_PRIV_KEY_INFO *p8, const EVP_PKEY *pk) argument 367 ASN1_OBJECT *algobj = OBJ_nid2obj(EVP_PKEY_base_id(pk)); 368 ASN1_STRING *params = encode_gost_algor_params(pk); 377 asn1key = BN_to_ASN1_INTEGER(gost_get0_priv_key(pk),NULL); 511 static int param_missing_gost94(const EVP_PKEY *pk) argument 513 const DSA *dsa = EVP_PKEY_get0((EVP_PKEY *)pk); 519 static int param_missing_gost01(const EVP_PKEY *pk) argument 606 pub_decode_gost94(EVP_PKEY *pk, X509_PUBKEY *pub) argument 639 pub_encode_gost94(X509_PUBKEY *pub,const EVP_PKEY *pk) argument 673 pub_decode_gost01(EVP_PKEY *pk,X509_PUBKEY *pub) argument 733 pub_encode_gost01(X509_PUBKEY *pub,const EVP_PKEY *pk) argument 818 pkey_size_gost(const EVP_PKEY *pk) argument 823 pkey_bits_gost(const EVP_PKEY *pk) argument 828 mackey_free_gost(EVP_PKEY *pk) argument [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/cpl/trousers/dist/src/tspi/daa/daa_issuer/ |
H A D | key_correctness_proof.c | 30 static bi_array_ptr get_generators( const TSS_DAA_PK_internal *pk) { argument 34 bi_new_array( result, 3 + pk->capitalY->length ); 36 result->array[i] = pk->capitalS; 41 static bi_array_ptr get_verifiable_numbers( const TSS_DAA_PK_internal *pk) { argument 45 bi_new_array( result, 3 + pk->capitalY->length); 46 result->array[0] = pk->capitalZ; 47 result->array[1] = pk->capitalR0; 48 result->array[2] = pk->capitalR1; 50 for( i=0; i<pk->capitalY ->length; i++) 51 result->array[ 3+i] = pk 84 generateMessageDigest(BYTE *md_value, int *md_len, const TSS_DAA_PK_internal *pk, bi_array_ptr *commitments, const int commitments_size ) argument [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/crypto/ |
H A D | crypto_libtomcrypt.c | 425 struct crypto_public_key *pk; local 427 pk = os_zalloc(sizeof(*pk)); 428 if (pk == NULL) 431 res = rsa_import(key, len, &pk->rsa); 436 os_free(pk); 440 if (pk->rsa.type != PK_PUBLIC) { 443 rsa_free(&pk->rsa); 444 os_free(pk); 448 return pk; 457 struct crypto_private_key *pk; local [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/apps/ |
H A D | dsa.c | 339 EVP_PKEY *pk; local 340 pk = EVP_PKEY_new(); 341 EVP_PKEY_set1_DSA(pk, dsa); 343 i = i2b_PVK_bio(out, pk, pvk_encr, 0, passout); 345 i = i2b_PublicKey_bio(out, pk); 347 i = i2b_PrivateKey_bio(out, pk); 348 EVP_PKEY_free(pk);
|
H A D | rsa.c | 414 EVP_PKEY *pk; local 415 pk = EVP_PKEY_new(); 416 EVP_PKEY_set1_RSA(pk, rsa); 418 i = i2b_PVK_bio(out, pk, pvk_encr, 0, passout); 420 i = i2b_PublicKey_bio(out, pk); 422 i = i2b_PrivateKey_bio(out, pk); 423 EVP_PKEY_free(pk);
|
/netbsd-6-1-5-RELEASE/sbin/ifconfig/ |
H A D | parse.c | 632 const struct pkw *pk = (const struct pkw *)p; local 639 SIMPLEQ_FOREACH(k, &pk->pk_keywords, k_next) { 853 pkw_setwords(struct pkw *pk, parser_exec_t defexec, const char *defkey, argument 871 SIMPLEQ_INSERT_TAIL(&pk->pk_keywords, k, k_next); 876 while ((k = SIMPLEQ_FIRST(&pk->pk_keywords)) != NULL) { 877 SIMPLEQ_REMOVE_HEAD(&pk->pk_keywords, k_next); 887 struct pkw *pk = (struct pkw *)p; local 890 if (pk->pk_nkwinit == 0) 892 else if (pkw_setwords(pk, pk 910 struct pkw *pk; local [all...] |