/dragonfly/crypto/libressl/crypto/dsa/ |
H A D | dsa_prn.c | 100 EVP_PKEY *pk; in DSA_print() local 103 pk = EVP_PKEY_new(); in DSA_print() 104 if (!pk || !EVP_PKEY_set1_DSA(pk, (DSA *)x)) in DSA_print() 106 ret = EVP_PKEY_print_private(bp, pk, off, NULL); in DSA_print() 107 EVP_PKEY_free(pk); in DSA_print() 114 EVP_PKEY *pk; in DSAparams_print() local 117 pk = EVP_PKEY_new(); in DSAparams_print() 118 if (!pk || !EVP_PKEY_set1_DSA(pk, (DSA *)x)) in DSAparams_print() 120 ret = EVP_PKEY_print_params(bp, pk, 4, NULL); in DSAparams_print() 121 EVP_PKEY_free(pk); in DSAparams_print()
|
/dragonfly/crypto/libressl/crypto/gost/ |
H A D | gostr341001_ameth.c | 175 pkey_size_gost01(const EVP_PKEY *pk) in pkey_size_gost01() argument 183 pkey_bits_gost01(const EVP_PKEY *pk) in pkey_bits_gost01() argument 208 (void)EVP_PKEY_assign_GOST(pk, NULL); in pub_decode_gost01() 253 const GOST_KEY *ec = pk->pkey.gost; in pub_encode_gost01() 257 if (pk->save_parameters) { in pub_encode_gost01() 258 params = encode_gost01_algor_params(pk); in pub_encode_gost01() 421 (void)EVP_PKEY_assign_GOST(pk, NULL); in priv_decode_gost01() 458 ec = pk->pkey.gost; in priv_decode_gost01() 465 if (EVP_PKEY_assign_GOST(pk, ec) == 0) { in priv_decode_gost01() 577 param_missing_gost01(const EVP_PKEY *pk) in param_missing_gost01() argument [all …]
|
H A D | gost89imit_ameth.c | 61 mackey_free_gost(EVP_PKEY *pk) in mackey_free_gost() argument 63 free(pk->pkey.ptr); in mackey_free_gost()
|
/dragonfly/crypto/libressl/crypto/rsa/ |
H A D | rsa_prn.c | 84 EVP_PKEY *pk; in RSA_print() local 87 pk = EVP_PKEY_new(); in RSA_print() 88 if (!pk || !EVP_PKEY_set1_RSA(pk, (RSA *)x)) in RSA_print() 90 ret = EVP_PKEY_print_private(bp, pk, off, NULL); in RSA_print() 91 EVP_PKEY_free(pk); in RSA_print()
|
/dragonfly/crypto/libressl/crypto/asn1/ |
H A D | asn1_locl.h | 102 int (*pub_decode)(EVP_PKEY *pk, X509_PUBKEY *pub); 103 int (*pub_encode)(X509_PUBKEY *pub, const EVP_PKEY *pk); 109 int (*priv_encode)(PKCS8_PRIV_KEY_INFO *p8, const EVP_PKEY *pk); 113 int (*pkey_size)(const EVP_PKEY *pk); 114 int (*pkey_bits)(const EVP_PKEY *pk); 115 int (*pkey_security_bits)(const EVP_PKEY *pk); 120 int (*param_missing)(const EVP_PKEY *pk); 142 int (*pkey_check)(const EVP_PKEY *pk); 143 int (*pkey_public_check)(const EVP_PKEY *pk); 144 int (*pkey_param_check)(const EVP_PKEY *pk); [all …]
|
H A D | ameth_lib.c | 373 int (*pub_decode)(EVP_PKEY *pk, X509_PUBKEY *pub), in EVP_PKEY_asn1_set_public() argument 374 int (*pub_encode)(X509_PUBKEY *pub, const EVP_PKEY *pk), in EVP_PKEY_asn1_set_public() argument 378 int (*pkey_size)(const EVP_PKEY *pk), in EVP_PKEY_asn1_set_public() argument 379 int (*pkey_bits)(const EVP_PKEY *pk)) in EVP_PKEY_asn1_set_public() argument 391 int (*priv_decode)(EVP_PKEY *pk, const PKCS8_PRIV_KEY_INFO *p8inf), in EVP_PKEY_asn1_set_private() argument 392 int (*priv_encode)(PKCS8_PRIV_KEY_INFO *p8, const EVP_PKEY *pk), in EVP_PKEY_asn1_set_private() argument 405 int (*param_missing)(const EVP_PKEY *pk), in EVP_PKEY_asn1_set_param() argument 442 int (*pkey_check)(const EVP_PKEY *pk)) in EVP_PKEY_asn1_set_check() argument 449 int (*pkey_public_check)(const EVP_PKEY *pk)) in EVP_PKEY_asn1_set_public_check() argument 456 int (*pkey_param_check)(const EVP_PKEY *pk)) in EVP_PKEY_asn1_set_param_check() argument
|
H A D | x_pubkey.c | 143 X509_PUBKEY *pk = NULL; in X509_PUBKEY_set() local 147 if ((pk = X509_PUBKEY_new()) == NULL) in X509_PUBKEY_set() 152 if (!pkey->ameth->pub_encode(pk, pkey)) { in X509_PUBKEY_set() 168 *x = pk; in X509_PUBKEY_set() 173 if (pk != NULL) in X509_PUBKEY_set() 174 X509_PUBKEY_free(pk); in X509_PUBKEY_set() 729 X509_PUBKEY_get0_param(ASN1_OBJECT **ppkalg, const unsigned char **pk, in X509_PUBKEY_get0_param() argument 734 if (pk) { in X509_PUBKEY_get0_param() 735 *pk = pub->public_key->data; in X509_PUBKEY_get0_param()
|
H A D | p8_pkey.c | 159 PKCS8_pkey_get0(const ASN1_OBJECT **ppkalg, const unsigned char **pk, in PKCS8_pkey_get0() argument 164 if (pk != NULL) { in PKCS8_pkey_get0() 165 *pk = ASN1_STRING_data(p8->pkey); in PKCS8_pkey_get0()
|
/dragonfly/crypto/openssh/ |
H A D | ed25519.c | 14 static void get_hram(unsigned char *hram, const unsigned char *sm, const unsigned char *pk, unsigne… in get_hram() argument 19 for (i = 32;i < 64;++i) playground[i] = pk[i-32]; in get_hram() 27 unsigned char *pk, in crypto_sign_ed25519_keypair() argument 45 ge25519_pack(pk, &gepk); in crypto_sign_ed25519_keypair() 47 sk[32 + i] = pk[i]; in crypto_sign_ed25519_keypair() 106 const unsigned char *pk in crypto_sign_ed25519_open() argument 119 if (ge25519_unpackneg_vartime(&get1, pk)) return -1; in crypto_sign_ed25519_open() 121 get_hram(hram,sm,pk,m,smlen); in crypto_sign_ed25519_open()
|
H A D | sntrup761.c | 1061 Rq_encode(pk,h); in ZKeyGen() 1071 Rq_decode(h,pk); in ZEncrypt() 1113 XKeyGen(pk,A,a); pk += Seeds_bytes; in ZKeyGen() 1114 Rounded_encode(pk,A); in ZKeyGen() 1125 Rounded_decode(A,pk+Seeds_bytes); in ZEncrypt() 1126 XEncrypt(B,T,r,pk,A); in ZEncrypt() 1208 HashConfirm(c,r_enc,pk,cache); in Hide() 1220 Hide(c,r_enc,r,pk,cache); in Encap() 1247 Hide(cnew,r_enc,r,pk,cache); in Decap() 1258 KEM_KeyGen(pk,sk); in crypto_kem_sntrup761_keypair() [all …]
|
H A D | xmss_fast.h | 76 int xmss_keypair(unsigned char *pk, unsigned char *sk, bds_state *state, xmss_params *params); 90 …nsigned char *sig_msg,unsigned long long sig_msg_len, const unsigned char *pk, const xmss_params *… 97 int xmssmt_keypair(unsigned char *pk, unsigned char *sk, bds_state *states, unsigned char *wots_sig… 109 …signed char *sig_msg, unsigned long long sig_msg_len, const unsigned char *pk, const xmssmt_params…
|
/dragonfly/crypto/libressl/crypto/ec/ |
H A D | eck_prn.c | 123 EVP_PKEY *pk; in EC_KEY_print() local 125 pk = EVP_PKEY_new(); in EC_KEY_print() 126 if (!pk || !EVP_PKEY_set1_EC_KEY(pk, (EC_KEY *) x)) in EC_KEY_print() 128 ret = EVP_PKEY_print_private(bp, pk, off, NULL); in EC_KEY_print() 129 EVP_PKEY_free(pk); in EC_KEY_print() 136 EVP_PKEY *pk; in ECParameters_print() local 138 pk = EVP_PKEY_new(); in ECParameters_print() 139 if (!pk || !EVP_PKEY_set1_EC_KEY(pk, (EC_KEY *) x)) in ECParameters_print() 141 ret = EVP_PKEY_print_params(bp, pk, 4, NULL); in ECParameters_print() 142 EVP_PKEY_free(pk); in ECParameters_print()
|
/dragonfly/contrib/wpa_supplicant/src/crypto/ |
H A D | crypto_libtomcrypt.c | 425 pk = os_zalloc(sizeof(*pk)); in crypto_public_key_import() 426 if (pk == NULL) in crypto_public_key_import() 434 os_free(pk); in crypto_public_key_import() 441 rsa_free(&pk->rsa); in crypto_public_key_import() 442 os_free(pk); in crypto_public_key_import() 446 return pk; in crypto_public_key_import() 457 pk = os_zalloc(sizeof(*pk)); in crypto_private_key_import() 458 if (pk == NULL) in crypto_private_key_import() 466 os_free(pk); in crypto_private_key_import() 474 os_free(pk); in crypto_private_key_import() [all …]
|
/dragonfly/crypto/libressl/crypto/x509/ |
H A D | x509type.c | 71 const EVP_PKEY *pk = pkey; in X509_certificate_type() local 77 if (pk == NULL) { in X509_certificate_type() 78 if ((pk = X509_get0_pubkey(x)) == NULL) in X509_certificate_type() 82 switch (pk->type) { in X509_certificate_type() 123 if (EVP_PKEY_size(pk) <= 1024 / 8) in X509_certificate_type()
|
H A D | x509_skey.c | 119 ASN1_BIT_STRING *pk; in s2i_skey_id() local 140 pk = ctx->subject_req->req_info->pubkey->public_key; in s2i_skey_id() 142 pk = ctx->subject_cert->cert_info->key->public_key; in s2i_skey_id() 144 if (!pk) { in s2i_skey_id() 149 if (!EVP_Digest(pk->data, pk->length, pkey_dig, &diglen, in s2i_skey_id()
|
/dragonfly/crypto/libressl/crypto/pem/ |
H A D | pvkfmt.c | 488 if (pk->type == EVP_PKEY_DSA) { in do_i2b() 491 } else if (pk->type == EVP_PKEY_RSA) { in do_i2b() 522 write_dsa(&p, pk->pkey.dsa, ispub); in do_i2b() 524 write_rsa(&p, pk->pkey.rsa, ispub); in do_i2b() 536 outlen = do_i2b(&tmp, pk, ispub); in do_i2b_bio() 647 return do_i2b_bio(out, pk, 0); in i2b_PrivateKey_bio() 651 i2b_PublicKey_bio(BIO *out, EVP_PKEY *pk) in i2b_PublicKey_bio() argument 653 return do_i2b_bio(out, pk, 1); in i2b_PublicKey_bio() 855 pklen = do_i2b(NULL, pk, 0); in i2b_PVK() 867 if (pk->type == EVP_PKEY_DSA) in i2b_PVK() [all …]
|
/dragonfly/crypto/libressl/crypto/cms/ |
H A D | cms_env.c | 219 EVP_PKEY_up_ref(pk); in cms_RecipientInfo_ktri_init() 221 ktri->pkey = pk; in cms_RecipientInfo_ktri_init() 245 EVP_PKEY *pk = NULL; in CMS_add1_recipient_cert() local 256 pk = X509_get0_pubkey(recip); in CMS_add1_recipient_cert() 257 if (!pk) { in CMS_add1_recipient_cert() 262 switch (cms_pkey_get_ri_type(pk)) { in CMS_add1_recipient_cert() 305 if (pk) in CMS_RecipientInfo_ktri_get0_algs() 306 *pk = ktri->pkey; in CMS_RecipientInfo_ktri_get0_algs() 970 cms_pkey_get_ri_type(EVP_PKEY *pk) in cms_pkey_get_ri_type() argument 972 if (pk->ameth && pk->ameth->pkey_ctrl) { in cms_pkey_get_ri_type() [all …]
|
H A D | cms_kari.c | 205 CMS_RecipientInfo_kari_set0_pkey(CMS_RecipientInfo *ri, EVP_PKEY *pk) in CMS_RecipientInfo_kari_set0_pkey() argument 212 if (!pk) in CMS_RecipientInfo_kari_set0_pkey() 214 pctx = EVP_PKEY_CTX_new(pk, NULL); in CMS_RecipientInfo_kari_set0_pkey() 315 cms_kari_create_ephemeral_key(CMS_KeyAgreeRecipientInfo *kari, EVP_PKEY *pk) in cms_kari_create_ephemeral_key() argument 321 pctx = EVP_PKEY_CTX_new(pk, NULL); in cms_kari_create_ephemeral_key() 348 cms_RecipientInfo_kari_init(CMS_RecipientInfo *ri, X509 *recip, EVP_PKEY *pk, in cms_RecipientInfo_kari_init() argument 385 if (!cms_kari_create_ephemeral_key(kari, pk)) in cms_RecipientInfo_kari_init() 388 EVP_PKEY_up_ref(pk); in cms_RecipientInfo_kari_init() 389 rek->pkey = pk; in cms_RecipientInfo_kari_init()
|
H A D | cms_smime.c | 650 cms_kari_set1_pkey(CMS_ContentInfo *cms, CMS_RecipientInfo *ri, EVP_PKEY *pk, in cms_kari_set1_pkey() argument 664 CMS_RecipientInfo_kari_set0_pkey(ri, pk); in cms_kari_set1_pkey() 676 CMS_decrypt_set1_pkey(CMS_ContentInfo *cms, EVP_PKEY *pk, X509 *cert) in CMS_decrypt_set1_pkey() argument 686 ri_type = cms_pkey_get_ri_type(pk); in CMS_decrypt_set1_pkey() 698 r = cms_kari_set1_pkey(cms, ri, pk, cert); in CMS_decrypt_set1_pkey() 709 EVP_PKEY_up_ref(pk); in CMS_decrypt_set1_pkey() 710 CMS_RecipientInfo_set0_pkey(ri, pk); in CMS_decrypt_set1_pkey() 810 CMS_decrypt(CMS_ContentInfo *cms, EVP_PKEY *pk, X509 *cert, BIO *dcont, in CMS_decrypt() argument 830 if (!pk && !cert && !dcont && !out) in CMS_decrypt() 832 if (pk && !CMS_decrypt_set1_pkey(cms, pk, cert)) in CMS_decrypt()
|
/dragonfly/usr.bin/newkey/ |
H A D | generic.c | 100 BIGNUM *pk, *sk, *tmp, *base, *root, *modulus; in genkeys() local 102 pk = itobn(0); in genkeys() 126 BN_mod_exp(pk, root, sk, modulus, ctx); in genkeys() 134 if ((xkey = BN_bn2hex(pk)) == NULL) in genkeys() 142 BN_free(pk); in genkeys()
|
/dragonfly/crypto/libressl/apps/openssl/ |
H A D | dsa.c | 338 EVP_PKEY *pk; in dsa_main() local 339 pk = EVP_PKEY_new(); in dsa_main() 340 EVP_PKEY_set1_DSA(pk, dsa); in dsa_main() 342 i = i2b_PVK_bio(out, pk, dsa_config.pvk_encr, 0, in dsa_main() 345 i = i2b_PublicKey_bio(out, pk); in dsa_main() 347 i = i2b_PrivateKey_bio(out, pk); in dsa_main() 348 EVP_PKEY_free(pk); in dsa_main()
|
H A D | rsa.c | 383 EVP_PKEY *pk; in rsa_main() local 384 pk = EVP_PKEY_new(); in rsa_main() 385 EVP_PKEY_set1_RSA(pk, rsa); in rsa_main() 387 i = i2b_PVK_bio(out, pk, rsa_config.pvk_encr, 0, in rsa_main() 390 i = i2b_PublicKey_bio(out, pk); in rsa_main() 392 i = i2b_PrivateKey_bio(out, pk); in rsa_main() 393 EVP_PKEY_free(pk); in rsa_main()
|
/dragonfly/contrib/wpa_supplicant/src/tls/ |
H A D | tlsv1_common.c | 163 int tls_parse_cert(const u8 *buf, size_t len, struct crypto_public_key **pk) in tls_parse_cert() argument 170 *pk = crypto_public_key_from_cert(buf, len); in tls_parse_cert() 171 if (*pk) in tls_parse_cert() 193 *pk = crypto_public_key_import(cert->public_key, cert->public_key_len); in tls_parse_cert() 196 if (*pk == NULL) { in tls_parse_cert() 414 int tls_verify_signature(u16 tls_version, struct crypto_public_key *pk, in tls_verify_signature() argument 441 if (pk == NULL) { in tls_verify_signature() 453 if (crypto_public_key_decrypt_pkcs1(pk, pos, end - pos, buf, &buflen) < in tls_verify_signature()
|
/dragonfly/lib/libtelnet/ |
H A D | pk.c | 201 BIGNUM *pk, *sk, *tmp, *base, *root, *modulus; in genkeys() local 203 pk = itobn(0); in genkeys() 227 BN_mod_exp(pk, root, sk, modulus, ctx); in genkeys() 235 if ((xkey = BN_bn2hex(pk)) == NULL) in genkeys() 243 BN_free(pk); in genkeys()
|
/dragonfly/contrib/wpa_supplicant/src/eap_common/ |
H A D | eap_gpsk_common.c | 114 u8 *pk, size_t pk_len) in eap_gpsk_derive_keys_helper() argument 180 if (pk) { in eap_gpsk_derive_keys_helper() 182 os_memcpy(pk, pos, pk_len); in eap_gpsk_derive_keys_helper() 192 u8 *pk, size_t *pk_len) in eap_gpsk_derive_keys_aes() argument 220 pk, *pk_len); in eap_gpsk_derive_keys_aes() 285 u8 *pk, size_t *pk_len) in eap_gpsk_derive_keys() argument 321 pk, pk_len); in eap_gpsk_derive_keys()
|