| /src/crypto/external/bsd/heimdal/dist/lib/krb5/ |
| pkinit-ec.c | 101 /* copy in public key, XXX find the best curve that the server support or use the clients curve if possible */ 124 /* copy in public key */ 181 EC_KEY *public = NULL; local 185 public = EC_KEY_new(); 186 if (public == NULL) 188 if (EC_KEY_set_group(public, group) != 1) { 189 EC_KEY_free(public); 193 if (o2i_ECPublicKey(&public, &in, in_sz) == NULL) { 194 EC_KEY_free(public); 197 N_("PKINIT: Can't parse ECDH public key", "")) [all...] |
| /src/external/gpl2/groff/dist/src/preproc/refer/ |
| label.y | 11 the terms of the GNU General Public License as published by the Free 17 FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License 20 You should have received a copy of the GNU General Public License along 61 class at_expr : public expression { 62 public: label 68 class format_expr : public expression { 72 public: label 79 class field_expr : public expression { 82 public: label 88 class literal_expr : public expression 90 public: label 98 public: label 109 public: label 116 public: label 129 public: label 139 public: label 148 public: label 154 public: label 163 public: label 173 public: label 179 public: label 185 public: label 195 public: label 208 public: label [all...] |
| /src/crypto/external/bsd/heimdal/dist/kdc/ |
| pkinit-ec.c | 102 EC_KEY *ec_key_pk, /* the client's public key */ 131 "the client's public key"); 161 "public shared secret"); 175 void *ec_key_pk, /* the client's public key */ 197 EC_KEY *public = NULL; local 231 public = EC_KEY_new_by_curve_name(nid); 235 if (o2i_ECPublicKey(&public, &p, len) == NULL) { 241 *out = public; 242 public = NULL; 245 if (public) [all...] |
| /src/crypto/external/bsd/heimdal/dist/lib/hx509/ |
| test_soft_pkcs11.c | 92 CK_OBJECT_HANDLE public, private; local 147 ret = find_object(session, "cert", CKO_PUBLIC_KEY, &public); 173 ret = (*func->C_VerifyInit)(session, &mechanism, public); 194 ret = (*func->C_EncryptInit)(session, &mechanism, public);
|
| /src/sys/external/bsd/drm2/dist/drm/amd/display/modules/vmid/ |
| vmid.c | 34 struct mod_vmid public; member in struct:core_vmid 44 container_of(mod_vmid, struct core_vmid, public) 157 return &core_vmid->public;
|
| /src/crypto/external/apache2/openssl/dist/demos/encrypt/ |
| rsa_encrypt.c | 32 * For do_encrypt(), load an RSA public key from pub_key_der[]. 35 static EVP_PKEY *get_key(OSSL_LIB_CTX *libctx, const char *propq, int public) 43 if (public) { 99 int ret = 0, public = 1; local 107 /* Get public key */ 108 pub_key = get_key(libctx, propq, public); 110 fprintf(stderr, "Get public key failed.\n"); 156 int ret = 0, public = 0; local 165 priv_key = get_key(libctx, propq, public);
|
| /src/crypto/external/apache2/openssl/dist/demos/signature/ |
| EVP_EC_Signature_demo.c | 38 * For demo_verify, load EC public key pub_key from pub_key_der[]. 40 static EVP_PKEY *get_key(OSSL_LIB_CTX *libctx, const char *propq, int public) 48 if (public) { 62 fprintf(stderr, "Failed to load %s key.\n", public ? "public" : "private"); 69 int ret = 0, public = 0; local 77 priv_key = get_key(libctx, propq, public); 149 int ret = 0, public = 1; local 163 /* Get public key */ 164 pub_key = get_key(libctx, propq, public); [all...] |
| /src/crypto/external/bsd/openssl/dist/demos/signature/ |
| EVP_Signature_demo.c | 42 * For demo_verify, load EC public key pub_key from pub_key_der[]. 44 static EVP_PKEY *get_key(OSSL_LIB_CTX *libctx, const char *propq, int public) 52 if (public) { 66 fprintf(stderr, "Failed to load %s key.\n", public ? "public" : "private"); 73 int result = 0, public = 0; local 81 priv_key = get_key(libctx, propq, public); 153 int result = 0, public = 1; local 167 /* Get public key */ 168 pub_key = get_key(libctx, propq, public); [all...] |
| /src/lib/libtelnet/ |
| pk.c | 39 /* public key routines */ 41 genkeys(char *public, char *secret) 42 common_key(char *secret, char *public, desData *deskey) 46 char public[HEXKEYBYTES + 1]; 130 * get common key from my secret key and his public key 135 BIGNUM *public = BN_new(); local 142 (void)BN_hex2bn(&public, xpublic); 146 BN_mod_exp(common, public, secret, modulus, ctx); 154 BN_free(public); 171 * Generate a random public/secret key pai [all...] |
| /src/crypto/external/apache2/openssl/dist/ssl/quic/ |
| quic_txpim.c | 16 QUIC_TXPIM_PKT public; member in struct:quic_txpim_pkt_ex_st 109 memset(&ex->public.ackm_pkt, 0, sizeof(ex->public.ackm_pkt)); 110 ossl_quic_txpim_pkt_clear_chunks(&ex->public); 111 ex->public.retx_head = NULL; 112 ex->public.fifd = NULL; 113 ex->public.had_handshake_done_frame = 0; 114 ex->public.had_max_data_frame = 0; 115 ex->public.had_max_streams_bidi_frame = 0; 116 ex->public.had_max_streams_uni_frame = 0 [all...] |
| quic_cfq.c | 16 QUIC_CFQ_ITEM public; member in struct:quic_cfq_item_ex_st 258 return &item->public; 346 return &item->public; 365 return &ex->public;
|
| /src/sys/external/bsd/drm2/dist/drm/amd/display/modules/stats/ |
| stats.c | 82 struct mod_stats public; member in struct:core_stats 99 container_of(mod_stats, struct core_stats, public) 177 return &core_stats->public;
|
| /src/crypto/external/cpl/trousers/dist/src/tspi/ |
| tsp_delegate.c | 333 get_delegate_index(TSS_HCONTEXT hContext, UINT32 index, TPM_DELEGATE_PUBLIC *public) 350 result = Trspi_UnloadBlob_TPM_DELEGATE_PUBLIC(&offset, delegateTable, public); 378 TPM_DELEGATE_PUBLIC public; local 395 __tspi_memset(&public, 0, sizeof(public)); 396 public.tag = TPM_TAG_DELEGATE_PUBLIC; 397 public.label.label = bLabel; 399 if ((result = Trspi_UnloadBlob_PCR_INFO_SHORT(&offset, pcrInfo, &public.pcrInfo))) 401 public.permissions.tag = TPM_TAG_DELEGATIONS; 402 public.permissions.delegateType [all...] |
| tspi_delegate.c | 164 TPM_DELEGATE_PUBLIC public; local 167 result = get_delegate_index(hContext, ulIndex, &public); 169 free(public.pcrInfo.pcrSelection.pcrSelect);
|
| obj_policy.c | 1152 TPM_DELEGATE_PUBLIC public; local 1160 if ((result = get_delegate_index(obj->tspContext, index, &public))) 1163 free(public.pcrInfo.pcrSelection.pcrSelect); 1166 switch (public.permissions.delegateType) { 1239 TPM_DELEGATE_PUBLIC public; local 1248 if ((result = obj_policy_get_delegate_public(obj, &public))) 1250 *per1 = public.permissions.per1; 1251 free(public.pcrInfo.pcrSelection.pcrSelect); 1289 TPM_DELEGATE_PUBLIC public; local 1298 if ((result = obj_policy_get_delegate_public(obj, &public))) 1411 TPM_DELEGATE_PUBLIC public; local 1438 TPM_DELEGATE_PUBLIC public; local 1465 TPM_DELEGATE_PUBLIC public; local 1492 TPM_DELEGATE_PUBLIC public; local 1519 TPM_DELEGATE_PUBLIC public; local 1554 TPM_DELEGATE_PUBLIC public; local [all...] |
| /src/sys/external/bsd/drm2/dist/drm/amd/display/modules/freesync/ |
| amdgpu_freesync.c | 56 struct mod_freesync public; member in struct:core_freesync 61 container_of(mod_freesync, struct core_freesync, public) 75 return &core_freesync->public;
|
| /src/crypto/external/bsd/openssl/dist/crypto/rand/ |
| rand_lib.c | 387 * There are three shared DRBG instances: <primary>, <public>, and 388 * <private>. The <public> and <private> DRBGs are secondary ones. 410 * The <public> DRBG 414 * The <public> secondary DRBG is thread-local, i.e., there is one instance 417 CRYPTO_THREAD_LOCAL public; member in struct:rand_global_st 466 if (!CRYPTO_THREAD_init_local(&dgbl->public, NULL)) 488 CRYPTO_THREAD_cleanup_local(&dgbl->public); 522 rand = CRYPTO_THREAD_get_local(&dgbl->public); 523 CRYPTO_THREAD_set_local(&dgbl->public, NULL); 671 * Get the public random generator [all...] |
| /src/crypto/external/apache2/openssl/dist/crypto/rand/ |
| rand_lib.c | 36 * There are three shared DRBG instances: <primary>, <public>, and 37 * <private>. The <public> and <private> DRBGs are secondary ones. 67 * The <public> DRBG 71 * The <public> secondary DRBG is thread-local, i.e., there is one instance 74 CRYPTO_THREAD_LOCAL public; member in struct:rand_global_st 549 if (!CRYPTO_THREAD_init_local(&dgbl->public, NULL)) 575 CRYPTO_THREAD_cleanup_local(&dgbl->public); 600 rand = CRYPTO_THREAD_get_local(&dgbl->public); 601 CRYPTO_THREAD_set_local(&dgbl->public, NULL); 848 rand = CRYPTO_THREAD_get_local(&dgbl->public); [all...] |
| /src/crypto/external/apache2/openssl/dist/test/ |
| drbgtest.c | 164 * |primary|, |public|, |private|: pointers to the three shared DRBGs 175 EVP_RAND_CTX *public, 201 || !TEST_int_ne(public_reseed = reseed_counter(public), 0) 212 /* Generate random output from the public and private DRBG */ 229 || !TEST_int_eq(state(public), expected_state) 240 /* Test whether public DRBG was reseeded as expected */ 241 if (!TEST_int_ge(reseed_counter(public), public_reseed) 242 || !TEST_uint_ge(reseed_counter(public), 248 /* Test whether public DRBG was reseeded as expected */ 262 if (!TEST_time_t_ge(reseed_time(public), reseed_time(primary) 520 EVP_RAND_CTX *primary, *public, *private; local 547 EVP_RAND_CTX *primary, *public, *private; local 681 EVP_RAND_CTX *public = NULL, *private = NULL; local [all...] |
| /src/crypto/external/bsd/openssl/dist/test/ |
| drbgtest.c | 171 * |primary|, |public|, |private|: pointers to the three shared DRBGs 182 EVP_RAND_CTX *public, 209 || !TEST_int_ne(public_reseed = reseed_counter(public), 0) 220 /* Generate random output from the public and private DRBG */ 236 || !TEST_int_eq(state(public), expected_state) 247 /* Test whether public DRBG was reseeded as expected */ 248 if (!TEST_int_ge(reseed_counter(public), public_reseed) 249 || !TEST_uint_ge(reseed_counter(public), 255 /* Test whether public DRBG was reseeded as expected */ 269 if (!TEST_time_t_ge(reseed_time(public), reseed_time(primary) 529 EVP_RAND_CTX *primary, *public, *private; local 556 EVP_RAND_CTX *primary, *public, *private; local 690 EVP_RAND_CTX *public = NULL, *private = NULL; local [all...] |
| /src/crypto/external/bsd/openssl.old/dist/test/ |
| drbgtest.c | 576 * |master|, |public|, |private|: pointers to the three shared DRBGs 586 RAND_DRBG *public, 604 || !TEST_int_ne(public->reseed_counter, 0) 609 if (!TEST_int_le(public->reseed_counter, master->reseed_counter) 620 /* Generate random output from the public and private DRBG */ 634 || !TEST_int_eq(public->state, expected_state) 645 /* Test whether public DRBG was reseeded as expected */ 651 /* Test whether public DRBG was reseeded as expected */ 658 if (!TEST_int_eq(public->reseed_counter, master->reseed_counter) 668 if (!TEST_time_t_ge(public->reseed_time, master->reseed_time 719 RAND_DRBG *master, *public, *private; local 851 RAND_DRBG *public = NULL, *private = NULL; local [all...] |
| /src/crypto/external/bsd/openssh/dist/ |
| ssh-add.c | 166 struct sshkey *public, *cert = NULL; local 173 if ((r = sshkey_load_public(filename, &public, &comment)) != 0) { 178 (key_only && !sshkey_is_cert(public)) || 179 (cert_only && sshkey_is_cert(public))) { 180 if (delete_one(agent_fd, public, comment, filename, qflag) == 0) 197 if (!sshkey_equal_public(cert, public)) 206 sshkey_free(public); 504 error_r(r, "Couldn't read public key %s", filename);
|
| ssh.c | 1693 * enabled, load the public keys so we can later use the ssh-keysign 1736 "local public host keys could be loaded."); 2431 struct sshkey *public; local 2486 check_load(sshkey_load_public(filename, &public, NULL), 2487 &public, filename, "pubkey"); local 2489 public ? public->type : -1); 2492 identity_keys[n_ids] = public; 2505 check_load(sshkey_load_public(cp, &public, NULL), 2506 &public, filename, "identity pubkey") local 2536 &public, filename, "identity cert"); local [all...] |
| /src/external/gpl3/gdb.old/dist/gdb/ |
| source.c | 7 it under the terms of the GNU General Public License as published by 14 GNU General Public License for more details. 16 You should have received a copy of the GNU General Public License 85 public: member in struct:current_source_location
|
| /src/external/gpl3/gdb/dist/gdb/ |
| source.c | 7 it under the terms of the GNU General Public License as published by 14 GNU General Public License for more details. 16 You should have received a copy of the GNU General Public License 85 public: member in struct:current_source_location
|