| /src/crypto/external/apache2/openssl/dist/crypto/x509/ |
| x509type.c | 18 const EVP_PKEY *pk; local 25 pk = X509_get0_pubkey(x); 27 pk = pkey; 29 if (pk == NULL) 32 switch (EVP_PKEY_get_id(pk)) {
|
| v3_skid.c | 57 const unsigned char *pk; local 78 X509_PUBKEY_get0_param(NULL, &pk, &pklen, NULL, pubkey); 79 if (EVP_Digest(pk, pklen, pkey_dig, &diglen, md, NULL)
|
| /src/crypto/external/bsd/openssl/dist/crypto/x509/ |
| x509type.c | 18 const EVP_PKEY *pk; local 25 pk = X509_get0_pubkey(x); 27 pk = pkey; 29 if (pk == NULL) 32 switch (EVP_PKEY_get_id(pk)) {
|
| v3_skid.c | 58 const unsigned char *pk; local 79 X509_PUBKEY_get0_param(NULL, &pk, &pklen, NULL, pubkey); 80 if (EVP_Digest(pk, pklen, pkey_dig, &diglen, md, NULL)
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/x509/ |
| x509type.c | 18 const EVP_PKEY *pk; local 25 pk = X509_get0_pubkey(x); 27 pk = pkey; 29 if (pk == NULL) 32 switch (EVP_PKEY_id(pk)) {
|
| /src/crypto/external/apache2/openssl/dist/crypto/rsa/ |
| rsa_prn.c | 40 EVP_PKEY *pk; local 42 pk = EVP_PKEY_new(); 43 if (pk == NULL) 45 ret = EVP_PKEY_set1_RSA(pk, (RSA *)x); 47 ret = EVP_PKEY_print_private(bp, pk, off, NULL); 48 EVP_PKEY_free(pk);
|
| /src/crypto/external/bsd/openssl/dist/crypto/rsa/ |
| rsa_prn.c | 40 EVP_PKEY *pk; local 42 pk = EVP_PKEY_new(); 43 if (pk == NULL) 45 ret = EVP_PKEY_set1_RSA(pk, (RSA *)x); 47 ret = EVP_PKEY_print_private(bp, pk, off, NULL); 48 EVP_PKEY_free(pk);
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/rsa/ |
| rsa_prn.c | 34 EVP_PKEY *pk; local 36 pk = EVP_PKEY_new(); 37 if (pk == NULL) 39 ret = EVP_PKEY_set1_RSA(pk, (RSA *)x); 41 ret = EVP_PKEY_print_private(bp, pk, off, NULL); 42 EVP_PKEY_free(pk);
|
| /src/crypto/external/cpl/trousers/dist/src/tspi/daa/ |
| daa_debug.h | 7 TSS_DAA_PK_internal *pk; member in struct:tdKEY_PAIR_WITH_PROOF_internal
|
| daa_debug.c | 11 save_DAA_PK_internal( file, key_pair_with_proof->pk); 24 key_pair_with_proof->pk = load_DAA_PK_internal(file); 215 TSS_DAA_PK *pk; local 249 pk = i_2_e_TSS_DAA_PK( pk_internal, &normal_malloc, (TSS_HOBJECT)NULL); 250 memcpy( &(credential->issuerPK), pk, sizeof(TSS_DAA_PK)); 251 free( pk);
|
| /src/sys/external/isc/libsodium/dist/test/default/ |
| box_seed.c | 16 unsigned char pk[32]; local 18 crypto_box_seed_keypair(pk, sk, seed); 20 printf(",0x%02x", (unsigned int) pk[i]);
|
| box_seal.c | 8 unsigned char pk[crypto_box_PUBLICKEYBYTES]; local 16 crypto_box_keypair(pk, sk); 23 if (crypto_box_seal(c, m, m_len, pk) != 0) { 27 if (crypto_box_seal_open(m2, c, c_len, pk, sk) != 0) { 33 printf("%d\n", crypto_box_seal_open(m, c, 0U, pk, sk)); 34 printf("%d\n", crypto_box_seal_open(m, c, c_len - 1U, pk, sk)); 35 printf("%d\n", crypto_box_seal_open(m, c, c_len, sk, pk));
|
| sign.c | 12 const unsigned char pk[crypto_sign_PUBLICKEYBYTES]; member in struct:TestData_ 1076 unsigned char pk[crypto_sign_PUBLICKEYBYTES]; local [all...] |
| /src/crypto/external/apache2/openssl/dist/crypto/dsa/ |
| dsa_prn.c | 55 EVP_PKEY *pk; local 57 pk = EVP_PKEY_new(); 58 if (pk == NULL) 60 ret = EVP_PKEY_set1_DSA(pk, (DSA *)x); 62 ret = EVP_PKEY_print_private(bp, pk, off, NULL); 63 EVP_PKEY_free(pk); 69 EVP_PKEY *pk; local 71 pk = EVP_PKEY_new(); 72 if (pk == NULL) 74 ret = EVP_PKEY_set1_DSA(pk, (DSA *)x) [all...] |
| /src/crypto/external/bsd/openssl/dist/crypto/dsa/ |
| dsa_prn.c | 55 EVP_PKEY *pk; local 57 pk = EVP_PKEY_new(); 58 if (pk == NULL) 60 ret = EVP_PKEY_set1_DSA(pk, (DSA *)x); 62 ret = EVP_PKEY_print_private(bp, pk, off, NULL); 63 EVP_PKEY_free(pk); 69 EVP_PKEY *pk; local 71 pk = EVP_PKEY_new(); 72 if (pk == NULL) 74 ret = EVP_PKEY_set1_DSA(pk, (DSA *)x) [all...] |
| /src/crypto/external/bsd/openssl.old/dist/crypto/dsa/ |
| dsa_prn.c | 49 EVP_PKEY *pk; local 51 pk = EVP_PKEY_new(); 52 if (pk == NULL) 54 ret = EVP_PKEY_set1_DSA(pk, (DSA *)x); 56 ret = EVP_PKEY_print_private(bp, pk, off, NULL); 57 EVP_PKEY_free(pk); 63 EVP_PKEY *pk; local 65 pk = EVP_PKEY_new(); 66 if (pk == NULL) 68 ret = EVP_PKEY_set1_DSA(pk, (DSA *)x) [all...] |
| /src/crypto/external/bsd/openssl.old/dist/crypto/x509v3/ |
| v3_skey.c | 60 const unsigned char *pk; local 91 X509_PUBKEY_get0_param(NULL, &pk, &pklen, NULL, pubkey); 93 if (!EVP_Digest(pk, pklen, pkey_dig, &diglen, EVP_sha1(), NULL))
|
| /src/crypto/external/cpl/trousers/dist/src/tspi/daa/daa_issuer/ |
| key_verification.c | 38 TSS_DAA_PK *pk; local 41 pk = i_2_e_TSS_DAA_PK( pk_internal, &intern_alloc, (TSS_HOBJECT)NULL); 46 (TSS_HKEY)pk, 52 free_TSS_DAA_PK( pk); 141 isCorrect( hDAA, key_pair_with_proof->pk, key_pair_with_proof->proof);
|
| issuer_setup.c | 59 TSS_DAA_PK_internal *pk; local 127 pk = e_2_i_TSS_DAA_PK( key_pair->public_key); 136 key_pair_with_proof->pk = pk;
|
| /src/external/bsd/libfido2/dist/examples/ |
| util.c | 167 es256_pk_t *pk = NULL; local 171 if ((pk = es256_pk_new()) == NULL) { 176 if (es256_pk_from_ptr(pk, ptr, len) != FIDO_OK) { 192 if ((pkey = es256_pk_to_EVP_PKEY(pk)) == NULL) { 204 es256_pk_free(&pk); 224 es384_pk_t *pk = NULL; local 228 if ((pk = es384_pk_new()) == NULL) { 233 if (es384_pk_from_ptr(pk, ptr, len) != FIDO_OK) { 249 if ((pkey = es384_pk_to_EVP_PKEY(pk)) == NULL) { 261 es384_pk_free(&pk); 313 rs256_pk_t *pk = NULL; local 394 eddsa_pk_t *pk = NULL; local [all...] |
| assert.c | 54 void *pk; local 69 pk = es256_pk; 84 pk = es384_pk; 99 pk = rs256_pk; 114 pk = eddsa_pk; 163 r = fido_assert_verify(assert, 0, type, pk);
|
| /src/external/bsd/libfido2/dist/src/ |
| eddsa.c | 114 eddsa_pk_t *pk; local 116 if (pkp == NULL || (pk = *pkp) == NULL) 119 freezero(pk, sizeof(*pk)); 124 eddsa_pk_from_ptr(eddsa_pk_t *pk, const void *ptr, size_t len) 128 if (len < sizeof(*pk)) 131 memcpy(pk, ptr, sizeof(*pk)); 133 if ((pkey = eddsa_pk_to_EVP_PKEY(pk)) == NULL) { 156 eddsa_pk_from_EVP_PKEY(eddsa_pk_t *pk, const EVP_PKEY *pkey [all...] |
| /src/sys/external/isc/libsodium/dist/src/libsodium/crypto_scalarmult/curve25519/ref10/ |
| x25519_ref10.c | 139 fe25519 pk; local 149 edwards_to_montgomery(pk, A.Y, A.Z); 150 fe25519_tobytes(q, pk);
|
| /src/external/bsd/libfido2/dist/regress/ |
| eddsa.c | 108 eddsa_pk_t *pk; local 111 ASSERT_NOT_NULL((pk = eddsa_pk_new())); 112 ASSERT_INVAL(eddsa_pk_from_EVP_PKEY(pk, pkey)); 115 eddsa_pk_free(&pk);
|
| rs256.c | 158 rs256_pk_t *pk; local 161 ASSERT_NOT_NULL((pk = rs256_pk_new())); 162 ASSERT_INVAL(rs256_pk_from_EVP_PKEY(pk, pkey)); 165 rs256_pk_free(&pk);
|