| /src/crypto/external/apache2/openssl/dist/crypto/x509/ |
| x509spki.c | 28 /* Load a Netscape SPKI from a base64 encoded string */ 35 NETSCAPE_SPKI *spki; local 47 spki = d2i_NETSCAPE_SPKI(NULL, &p, spki_len); 49 return spki; 52 /* Generate a base64 encoded string from an SPKI */ 54 char *NETSCAPE_SPKI_b64_encode(NETSCAPE_SPKI *spki) 60 der_len = i2d_NETSCAPE_SPKI(spki, NULL); 71 i2d_NETSCAPE_SPKI(spki, &p);
|
| /src/crypto/external/bsd/openssl/dist/crypto/x509/ |
| x509spki.c | 28 /* Load a Netscape SPKI from a base64 encoded string */ 35 NETSCAPE_SPKI *spki; local 49 spki = d2i_NETSCAPE_SPKI(NULL, &p, spki_len); 51 return spki; 54 /* Generate a base64 encoded string from an SPKI */ 56 char *NETSCAPE_SPKI_b64_encode(NETSCAPE_SPKI *spki) 62 der_len = i2d_NETSCAPE_SPKI(spki, NULL); 74 i2d_NETSCAPE_SPKI(spki, &p);
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/x509/ |
| x509spki.c | 28 /* Load a Netscape SPKI from a base64 encoded string */ 35 NETSCAPE_SPKI *spki; local 49 spki = d2i_NETSCAPE_SPKI(NULL, &p, spki_len); 51 return spki; 54 /* Generate a base64 encoded string from an SPKI */ 56 char *NETSCAPE_SPKI_b64_encode(NETSCAPE_SPKI *spki) 61 der_len = i2d_NETSCAPE_SPKI(spki, NULL); 71 i2d_NETSCAPE_SPKI(spki, &p);
|
| /src/crypto/external/apache2/openssl/dist/apps/ |
| spkac.c | 75 NETSCAPE_SPKI *spki = NULL; local 162 spki = NETSCAPE_SPKI_new(); 163 if (spki == NULL) 166 && !ASN1_STRING_set(spki->spkac->challenge, 169 if (!NETSCAPE_SPKI_set_pubkey(spki, pkey)) { 173 i = NETSCAPE_SPKI_sign(spki, pkey, md); 178 spkstr = NETSCAPE_SPKI_b64_encode(spki); 204 spki = NETSCAPE_SPKI_b64_decode(spkstr, -1); 206 if (spki == NULL) { 217 NETSCAPE_SPKI_print(out, spki); [all...] |
| ca.c | 2012 NETSCAPE_SPKI *spki = NULL; local 2074 spki = NETSCAPE_SPKI_b64_decode(cv->value, -1); 2075 if (spki == NULL) { 2088 if (spki == NULL) { 2095 * Now extract the key from the SPKI structure. 2100 if ((pktmp = NETSCAPE_SPKI_get_pubkey(spki)) == NULL) { 2105 j = NETSCAPE_SPKI_verify(spki, pktmp); 2123 NETSCAPE_SPKI_free(spki);
|
| /src/crypto/external/apache2/openssl/dist/include/internal/ |
| dane.h | 49 EVP_PKEY *spki; member in struct:danetls_record_st
|
| /src/crypto/external/apache2/openssl/dist/test/ |
| algorithmid_test.c | 269 { "spki", OPT_SPKI, '-', "Test public keys in SubjectPublicKeyInfo form. Requires one file" }, 280 int n, x509 = 0, spki = 0, testcount = 0; local 288 spki = 1; 299 testcount = x509 + spki; 309 if (spki && n == 1) { 316 if (spki && pubkey_filename == NULL) { 317 BIO_printf(bio_err, "Missing -spki argument\n"); 326 if (spki)
|
| /src/crypto/external/bsd/heimdal/dist/kdc/ |
| kx509.c | 255 SubjectPublicKeyInfo spki; local 258 memset(&spki, 0, sizeof(spki)); 260 spki.subjectPublicKey.data = key->data; 261 spki.subjectPublicKey.length = key->length * 8; 264 &spki.algorithm.algorithm); 268 spki.algorithm.parameters = &any; 270 ret = hx509_ca_tbs_set_spki(context->hx509ctx, tbs, &spki); 271 der_free_oid(&spki.algorithm.algorithm);
|
| /src/crypto/external/bsd/openssl/dist/apps/ |
| spkac.c | 65 NETSCAPE_SPKI *spki = NULL; local 153 spki = NETSCAPE_SPKI_new(); 154 if (spki == NULL) 157 ASN1_STRING_set(spki->spkac->challenge, 159 if (!NETSCAPE_SPKI_set_pubkey(spki, pkey)) { 163 i = NETSCAPE_SPKI_sign(spki, pkey, md); 168 spkstr = NETSCAPE_SPKI_b64_encode(spki); 194 spki = NETSCAPE_SPKI_b64_decode(spkstr, -1); 196 if (spki == NULL) { 207 NETSCAPE_SPKI_print(out, spki); [all...] |
| ca.c | 2007 NETSCAPE_SPKI *spki = NULL; local 2069 spki = NETSCAPE_SPKI_b64_decode(cv->value, -1); 2070 if (spki == NULL) { 2083 if (spki == NULL) { 2090 * Now extract the key from the SPKI structure. 2095 if ((pktmp = NETSCAPE_SPKI_get_pubkey(spki)) == NULL) { 2100 j = NETSCAPE_SPKI_verify(spki, pktmp); 2118 NETSCAPE_SPKI_free(spki);
|
| /src/crypto/external/bsd/openssl/dist/include/internal/ |
| dane.h | 49 EVP_PKEY *spki; member in struct:danetls_record_st
|
| /src/crypto/external/bsd/openssl/dist/test/ |
| algorithmid_test.c | 268 { "spki", OPT_SPKI, '-', "Test public keys in SubjectPublicKeyInfo form. Requires one file" }, 279 int n, x509 = 0, spki = 0, testcount = 0; local 287 spki = 1; 298 testcount = x509 + spki; 308 if (spki && n == 1) { 315 if (spki && pubkey_filename == NULL) { 316 BIO_printf(bio_err, "Missing -spki argument\n"); 325 if (spki)
|
| /src/crypto/external/bsd/openssl.old/dist/apps/ |
| spkac.c | 56 NETSCAPE_SPKI *spki = NULL; local 130 spki = NETSCAPE_SPKI_new(); 131 if (spki == NULL) 134 ASN1_STRING_set(spki->spkac->challenge, 136 NETSCAPE_SPKI_set_pubkey(spki, pkey); 137 NETSCAPE_SPKI_sign(spki, pkey, EVP_md5()); 138 spkstr = NETSCAPE_SPKI_b64_encode(spki); 164 spki = NETSCAPE_SPKI_b64_decode(spkstr, -1); 166 if (spki == NULL) { 177 NETSCAPE_SPKI_print(out, spki); [all...] |
| ca.c | 1927 NETSCAPE_SPKI *spki = NULL; local 1992 spki = NETSCAPE_SPKI_b64_decode(cv->value, -1); 1993 if (spki == NULL) { 2007 if (spki == NULL) { 2014 * Now extract the key from the SPKI structure. 2019 if ((pktmp = NETSCAPE_SPKI_get_pubkey(spki)) == NULL) { 2024 j = NETSCAPE_SPKI_verify(spki, pktmp); 2042 NETSCAPE_SPKI_free(spki);
|
| /src/crypto/external/bsd/openssl.old/dist/include/internal/ |
| dane.h | 48 EVP_PKEY *spki; member in struct:danetls_record_st
|
| /src/crypto/external/bsd/heimdal/dist/lib/hx509/ |
| ca.c | 47 SubjectPublicKeyInfo spki; member in struct:hx509_ca_tbs 106 free_SubjectPublicKeyInfo(&(*tbs)->spki); 190 { "SPKI", HX509_CA_TEMPLATE_SPKI }, 260 free_SubjectPublicKeyInfo(&tbs->spki); 261 ret = hx509_cert_get_SPKI(context, cert, &tbs->spki); 360 * Set the subject public key info (SPKI) in the to-be-signed certificate 361 * object. SPKI is the public key and key related parameters in the 366 * @param spki subject public key info to use for the to-be-signed certificate object. 376 const SubjectPublicKeyInfo *spki) 379 free_SubjectPublicKeyInfo(&tbs->spki); [all...] |
| hxtool.c | 1811 SubjectPublicKeyInfo spki; local 1814 memset(&spki, 0, sizeof(spki)); 1873 ret = hx509_private_key2SPKI(context, private_key, &spki); 1890 ret = hx509_request_get_SubjectPublicKeyInfo(context, req, &spki); 1892 hx509_err(context, 1, ret, "get spki"); 1918 ret = hx509_private_key2SPKI(context, cert_key, &spki); 1999 if (spki.subjectPublicKey.length) { 2000 ret = hx509_ca_tbs_set_spki(context, tbs, &spki); 2082 free_SubjectPublicKeyInfo(&spki); [all...] |
| /src/crypto/external/apache2/openssl/dist/ssl/statem/ |
| statem_lib.c | 1137 const unsigned char *spki, *spkistart; local 1276 if (!PACKET_get_bytes(pkt, &spki, spki_len)) { 1280 spkistart = spki; 1281 if ((pkey = d2i_PUBKEY_ex(NULL, &spki, spki_len, sctx->libctx, sctx->propq)) == NULL 1282 || spki != (spkistart + spki_len)) {
|
| /src/crypto/external/apache2/openssl/dist/providers/implementations/encode_decode/ |
| decode_der2key.c | 685 BARE_PUBKEY *spki = NULL; local 716 if ((spki = OPENSSL_zalloc(sizeof(*spki))) == NULL) 719 /* The spki storage is freed on error */ 720 if (ASN1_item_d2i_ex((ASN1_VALUE **)&spki, &end, der_len, 729 /* The spki structure now owns some memory */ 730 if ((spki->pubkey->flags & 0x7) != 0 || end != *der + der_len) { 736 if (OBJ_cmp(OBJ_nid2obj(ctx->desc->evp_type), spki->algor.oid) != 0) { 743 if (!ossl_slh_dsa_set_pub(ret, spki->pubkey->data, spki->pubkey->length)) [all...] |