| /src/crypto/external/apache2/openssl/dist/apps/ |
| dgst.c | 118 EVP_PKEY *sigkey = NULL; local 304 sigkey = load_pubkey(keyfile, keyform, 0, NULL, e, "public key"); 306 sigkey = load_key(keyfile, keyform, 0, passin, e, "private key"); 307 if (sigkey == NULL) { 316 if (EVP_PKEY_get_default_digest_name(sigkey, def_md, 344 sigkey = app_keygen(mac_ctx, mac_name, 0, 0 /* not verbose */); 347 if (sigkey == NULL) 356 sigkey = EVP_PKEY_new_raw_private_key(EVP_PKEY_HMAC, impl, 359 if (sigkey == NULL) 363 if (sigkey != NULL) [all...] |
| /src/crypto/external/bsd/openssl/dist/apps/ |
| dgst.c | 98 EVP_PKEY *sigkey = NULL; local 283 sigkey = load_pubkey(keyfile, keyform, 0, NULL, e, "public key"); 285 sigkey = load_key(keyfile, keyform, 0, passin, e, "private key"); 286 if (sigkey == NULL) { 292 type = EVP_PKEY_get_id(sigkey); 320 sigkey = app_keygen(mac_ctx, mac_name, 0, 0 /* not verbose */); 323 if (sigkey == NULL) 332 sigkey = EVP_PKEY_new_raw_private_key(EVP_PKEY_HMAC, impl, 335 if (sigkey == NULL) 339 if (sigkey != NULL) [all...] |
| /src/crypto/external/bsd/openssl.old/dist/apps/ |
| dgst.c | 89 EVP_PKEY *sigkey = NULL; local 259 sigkey = load_pubkey(keyfile, keyform, 0, NULL, e, "key file"); 261 sigkey = load_key(keyfile, keyform, 0, passin, e, "key file"); 262 if (sigkey == NULL) { 268 type = EVP_PKEY_id(sigkey); 296 if (EVP_PKEY_keygen(mac_ctx, &sigkey) <= 0) { 309 sigkey = EVP_PKEY_new_raw_private_key(EVP_PKEY_HMAC, impl, 311 if (sigkey == NULL) 315 if (sigkey != NULL) { 325 r = EVP_DigestVerifyInit(mctx, &pctx, md, impl, sigkey); [all...] |
| /src/crypto/external/bsd/netpgp/dist/src/lib/ |
| validate.c | 241 pgp_pubkey_t *sigkey; local 304 &from, &sigkey); 315 if (sigkey == &signer->enckey) { 431 pgp_pubkey_t *sigkey; local 484 content->sig.info.signer_id, &from, &sigkey); 496 if (sigkey == &signer->enckey) {
|
| packet.h | 990 pgp_pubkey_t sigkey; /* signature key */ member in struct:pgp_key_t
|
| netpgp.c | 145 pgp_pubkey_t *sigkey; local 167 &from, &sigkey); 168 if (sigkey == &key->enckey) {
|