/netbsd/crypto/external/bsd/heimdal/dist/lib/krb5/ |
H A D | pkinit-ec.c | 147 a->clientPublicValue->subjectPublicKey.data = p; in _krb5_build_authpack_subjectPK_EC() 151 a->clientPublicValue->subjectPublicKey.data = NULL; in _krb5_build_authpack_subjectPK_EC() 156 a->clientPublicValue->subjectPublicKey.length = xlen * 8; in _krb5_build_authpack_subjectPK_EC()
|
H A D | pkinit.c | 541 a->clientPublicValue->subjectPublicKey.length = dhbuf.length * 8; in build_auth_pack() 542 a->clientPublicValue->subjectPublicKey.data = dhbuf.data; in build_auth_pack() 1443 p = kdc_dh_info.subjectPublicKey.data; in pk_rd_pa_reply_dh() 1444 size = (kdc_dh_info.subjectPublicKey.length + 7) / 8; in pk_rd_pa_reply_dh()
|
/netbsd/crypto/external/bsd/heimdal/dist/lib/hx509/ |
H A D | crypto.c | 198 p = spi->subjectPublicKey.data; in rsa_verify_signature() 199 size = spi->subjectPublicKey.length / 8; in rsa_verify_signature() 442 spki->subjectPublicKey.data = malloc(len); in rsa_private_key2SPKI() 447 spki->subjectPublicKey.length = len * 8; in rsa_private_key2SPKI() 454 free(spki->subjectPublicKey.data); in rsa_private_key2SPKI() 455 spki->subjectPublicKey.data = NULL; in rsa_private_key2SPKI() 456 spki->subjectPublicKey.length = 0; in rsa_private_key2SPKI() 615 spi->subjectPublicKey.length / 8, in dsa_verify_signature() 1233 p = spi->subjectPublicKey.data; in _hx509_public_encrypt() 1234 size = spi->subjectPublicKey.length / 8; in _hx509_public_encrypt() [all …]
|
H A D | crypto-ec.c | 191 p = spi->subjectPublicKey.data; in ecdsa_verify_signature() 192 len = spi->subjectPublicKey.length / 8; in ecdsa_verify_signature()
|
H A D | crmf.asn1 | 91 subjectPublicKey BIT STRING OPTIONAL
|
H A D | revoke.c | 764 os.data = p->tbsCertificate.subjectPublicKeyInfo.subjectPublicKey.data; in hx509_revoke_verify() 765 os.length = p->tbsCertificate.subjectPublicKeyInfo.subjectPublicKey.length / 8; in hx509_revoke_verify() 953 os.data = p->tbsCertificate.subjectPublicKeyInfo.subjectPublicKey.data; in add_to_req() 955 p->tbsCertificate.subjectPublicKeyInfo.subjectPublicKey.length / 8; in add_to_req()
|
H A D | ca.c | 1323 EVP_DigestUpdate(ctx, tbs->spki.subjectPublicKey.data, in ca_sign() 1324 tbs->spki.subjectPublicKey.length / 8); in ca_sign()
|
H A D | cert.c | 3071 os.data = c->tbsCertificate.subjectPublicKeyInfo.subjectPublicKey.data; in _hx509_query_match_cert() 3073 c->tbsCertificate.subjectPublicKeyInfo.subjectPublicKey.length / 8; in _hx509_query_match_cert() 3530 os.data = c->tbsCertificate.subjectPublicKeyInfo.subjectPublicKey.data; in _hx509_cert_to_env() 3532 c->tbsCertificate.subjectPublicKeyInfo.subjectPublicKey.length / 8; in _hx509_cert_to_env()
|
H A D | hxtool.c | 1999 if (spki.subjectPublicKey.length) { in hxtool_ca()
|
/netbsd/crypto/external/bsd/heimdal/dist/kdc/ |
H A D | pkinit-ec.c | 233 p = dh_key_info->subjectPublicKey.data; in get_ecdh_param() 234 len = dh_key_info->subjectPublicKey.length / 8; in get_ecdh_param()
|
H A D | pkinit.c | 307 if ((dh_key_info->subjectPublicKey.length % 8) != 0) { in get_dh_param() 374 ret = decode_DHPublicKey(dh_key_info->subjectPublicKey.data, in get_dh_param() 375 dh_key_info->subjectPublicKey.length / 8, in get_dh_param() 1054 dh_info.subjectPublicKey.length = buf.length * 8; in pk_mk_pa_reply_dh() 1055 dh_info.subjectPublicKey.data = buf.data; in pk_mk_pa_reply_dh() 1060 &dh_info.subjectPublicKey.length); in pk_mk_pa_reply_dh() 1061 dh_info.subjectPublicKey.data = p; in pk_mk_pa_reply_dh()
|
H A D | kx509.c | 260 spki.subjectPublicKey.data = key->data; in build_certificate() 261 spki.subjectPublicKey.length = key->length * 8; in build_certificate()
|
/netbsd/crypto/external/bsd/heimdal/dist/lib/asn1/ |
H A D | pkinit.asn1 | 121 subjectPublicKey [0] BIT STRING, 171 subjectPublicKey [2] BIT STRING
|
H A D | rfc2459.asn1 | 222 subjectPublicKey BIT STRING
|
H A D | ChangeLog | 709 public key in the SubjectPublicKeyInfo.subjectPublicKey BIT
|
/netbsd/external/bsd/openldap/dist/contrib/slapd-modules/comp_match/ |
H A D | certificate.c | 1251 …ublicKeyInfo*)csi_attr)->subjectPublicKey, (ComponentSyntaxInfo*)&((ComponentSubjectPublicKeyInfo*… in MatchingComponentSubjectPublicKeyInfo() 1269 …subjectPublicKey.identifier.bv_val && strncmp(comp->subjectPublicKey.identifier.bv_val, cr->cr_cur… in ExtractingComponentSubjectPublicKeyInfo() 1271 return &comp->subjectPublicKey; in ExtractingComponentSubjectPublicKeyInfo() 1274 return &comp->subjectPublicKey; in ExtractingComponentSubjectPublicKeyInfo() 1329 …rc = BDecComponentBits (mem_op, b, tagId1, elmtLen1, (&k->subjectPublicKey), &totalElmtsLen1, mode… 1331 (&k->subjectPublicKey)->identifier.bv_val = (&k->subjectPublicKey)->id_buf; 1332 (&k->subjectPublicKey)->identifier.bv_len = strlen("subjectPublicKey"); 1333 strcpy( (&k->subjectPublicKey)->identifier.bv_val, "subjectPublicKey"); 1423 rc = GDecComponentBits (mem_op, b, (&k->subjectPublicKey), bytesDecoded, mode); 1425 (&k->subjectPublicKey)->identifier.bv_val = peek_head; [all …]
|
H A D | certificate.asn1 | 56 subjectPublicKey BIT STRING }
|
H A D | certificate.h | 228 ComponentBits subjectPublicKey; /* BIT STRING */ member
|
/netbsd/crypto/external/bsd/openssl/dist/doc/man5/ |
H A D | x509v3_config.pod | 180 STRING subjectPublicKey (excluding the tag, length, and number of unused bits).
|
/netbsd/crypto/external/bsd/heimdal/dist/ |
H A D | ChangeLog.2005 | 382 subjectPublicKey. Don't verify OID's for now.
|