/third_party/openssl/crypto/dh/ |
H A D | dh_ameth.c | 60 static int dh_pub_decode(EVP_PKEY *pkey, const X509_PUBKEY *pubkey) in dh_pub_decode() argument 72 if (!X509_PUBKEY_get0_param(NULL, &p, &pklen, &palg, pubkey)) in dh_pub_decode() 161 * explicitly included and the pubkey must be recalculated.
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | crypto.h | 421 u8 *pubkey); 425 const u8 *pubkey, size_t pubkey_len,
|
/third_party/curl/lib/vtls/ |
H A D | schannel.c | 2631 struct Curl_asn1Element *pubkey; in schannel_pkp_pin_peer_pubkey() local 2656 pubkey = &x509_parsed.subjectPublicKeyInfo; in schannel_pkp_pin_peer_pubkey() 2657 if(!pubkey->header || pubkey->end <= pubkey->header) { in schannel_pkp_pin_peer_pubkey() 2664 (const unsigned char *)pubkey->header, in schannel_pkp_pin_peer_pubkey() 2665 (size_t)(pubkey->end - pubkey->header)); in schannel_pkp_pin_peer_pubkey()
|
H A D | vtls.c | 980 const unsigned char *pubkey, size_t pubkeylen) in Curl_pin_peer_pubkey() 992 if(!pubkey || !pubkeylen) in Curl_pin_peer_pubkey() 1011 encode = Curl_ssl->sha256sum(pubkey, pubkeylen, in Curl_pin_peer_pubkey() 1103 if(!memcmp(pubkey, buf, pubkeylen)) in Curl_pin_peer_pubkey() 1122 if(pubkeylen == pem_len && !memcmp(pubkey, pem_ptr, pubkeylen)) in Curl_pin_peer_pubkey() 978 Curl_pin_peer_pubkey(struct Curl_easy *data, const char *pinnedpubkey, const unsigned char *pubkey, size_t pubkeylen) Curl_pin_peer_pubkey() argument
|
/third_party/openssl/test/ |
H A D | evp_pkey_dparams_test.c | 30 struct pubkey { struct 218 struct pubkey keys[NUM_KEYS]; 279 const struct pubkey *keys = pkey_params[id].keys; in set_enc_pubkey_test()
|
H A D | evp_extra_test.c | 1842 const char *pubkey = in test_EVP_SM2_verify() local 1868 bio = BIO_new_mem_buf(pubkey, strlen(pubkey)); in test_EVP_SM2_verify() 2918 BIGNUM *pubkey = NULL; in test_EVP_PKEY_set1_DH() local 2924 || !TEST_ptr(pubkey = BN_new()) in test_EVP_PKEY_set1_DH() 2927 || !TEST_true(BN_set_word(pubkey, 4321)) in test_EVP_PKEY_set1_DH() 2930 || !TEST_true(DH_set0_key(noqdh, pubkey, NULL)) in test_EVP_PKEY_set1_DH() 2931 || !TEST_ptr(pubkey = BN_new()) in test_EVP_PKEY_set1_DH() 2932 || !TEST_true(BN_set_word(pubkey, 4321))) in test_EVP_PKEY_set1_DH() 2943 || !TEST_true(DH_set0_key(x942dh, pubkey, NUL in test_EVP_PKEY_set1_DH() 4686 unsigned char *pubkey; test_ecx_not_private_key() local [all...] |
/third_party/node/deps/openssl/openssl/apps/ |
H A D | req.c | 145 {"pubkey", OPT_PUBKEY, '-', "Output public key"}, 264 int noenc = 0, newhdr = 0, subject = 0, pubkey = 0, precert = 0; in req_main() local 308 pubkey = 1; in req_main() 944 if (noout && !text && !modulus && !subject && !pubkey) { in req_main() 956 if (pubkey) { in req_main()
|
/third_party/openssl/apps/ |
H A D | req.c | 145 {"pubkey", OPT_PUBKEY, '-', "Output public key"}, 264 int noenc = 0, newhdr = 0, subject = 0, pubkey = 0, precert = 0; in req_main() local 308 pubkey = 1; in req_main() 942 if (noout && !text && !modulus && !subject && !pubkey) { in req_main() 954 if (pubkey) { in req_main()
|
/third_party/node/deps/openssl/openssl/engines/ |
H A D | e_capi.c | 643 unsigned char *pubkey = NULL; in capi_get_pkey() local 655 pubkey = OPENSSL_malloc(len); in capi_get_pkey() 657 if (pubkey == NULL) in capi_get_pkey() 660 if (!CryptExportKey(key->key, 0, PUBLICKEYBLOB, 0, pubkey, &len)) { in capi_get_pkey() 666 bh = (BLOBHEADER *) pubkey; in capi_get_pkey() 780 OPENSSL_free(pubkey); in capi_get_pkey()
|
/third_party/openssl/engines/ |
H A D | e_capi.c | 643 unsigned char *pubkey = NULL; in capi_get_pkey() local 655 pubkey = OPENSSL_malloc(len); in capi_get_pkey() 657 if (pubkey == NULL) in capi_get_pkey() 660 if (!CryptExportKey(key->key, 0, PUBLICKEYBLOB, 0, pubkey, &len)) { in capi_get_pkey() 666 bh = (BLOBHEADER *) pubkey; in capi_get_pkey() 780 OPENSSL_free(pubkey); in capi_get_pkey()
|
/third_party/curl/src/ |
H A D | tool_cfgable.c | 136 Curl_safefree(config->pubkey); in free_config_fields()
|
/third_party/openssl/ohos_lite/include/crypto/ |
H A D | x509.h | 61 X509_PUBKEY *pubkey; /* public key of request */ member
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/wps/ |
H A D | wps_i.h | 178 const struct wpabuf *pubkey, const u8 *dev_pw,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/ |
H A D | sae.h | 34 struct wpabuf *pubkey; /* DER encoded subjectPublicKey */ member
|
H A D | wpa_common.h | 599 const u8 *pubkey; member 734 const struct wpabuf *pubkey, bool compressed,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/wps/ |
H A D | wps_i.h | 178 const struct wpabuf *pubkey, const u8 *dev_pw,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/common/ |
H A D | dpp.c | 793 EVP_PKEY_free(info->pubkey); in dpp_bootstrap_info_free() 1036 wpa_printf(MSG_DEBUG, "DPP: Could not set pubkey"); in dpp_parse_uri_pk() 1084 bi->pubkey = pkey; in dpp_parse_uri_pk() 1435 der = dpp_bootstrap_key_der(bi->pubkey); in dpp_bootstrap_key_hash() 1475 bi->pubkey = dpp_set_keypair(&bi->curve, privkey, privkey_len); in dpp_keygen() 1477 bi->pubkey = dpp_gen_keypair(bi->curve); in dpp_keygen() 1478 if (!bi->pubkey) in dpp_keygen() 1482 der = dpp_bootstrap_key_der(bi->pubkey); in dpp_keygen() 2298 if (dpp_ecdh(auth->own_protocol_key, auth->peer_bi->pubkey, in dpp_auth_init() 2549 bix = dpp_get_pubkey_point(auth->own_bi->pubkey, in dpp_gen_r_auth() [all...] |
/third_party/nghttp2/src/ |
H A D | shrpx_tls.cc | 279 auto pubkey = X509_get0_pubkey(cert); in servername_callback() local 281 auto pubkey = X509_get_pubkey(cert); in servername_callback() local 284 if (EVP_PKEY_base_id(pubkey) != EVP_PKEY_EC) { in servername_callback() 290 if (!EVP_PKEY_get_utf8_string_param(pubkey, "group", curve_name.data(), in servername_callback() 301 auto eckey = EVP_PKEY_get0_EC_KEY(pubkey); in servername_callback() 303 auto eckey = EVP_PKEY_get1_EC_KEY(pubkey); in servername_callback() 315 EVP_PKEY_free(pubkey); in servername_callback()
|
/third_party/mbedtls/include/psa/ |
H A D | crypto_se_driver.h | 1068 * to the \p pubkey buffer. 1075 * \p pubkey is \c NULL and \p pubkey_size is 0. 1088 * \param[out] pubkey A buffer where the driver can write the 1094 * \param pubkey_size The size of the `pubkey` buffer in bytes. 1100 * \p pubkey. If this is 0 or unchanged on return, 1101 * the core will not read the \p pubkey buffer, 1110 uint8_t *pubkey, size_t pubkey_size, size_t *pubkey_length);
|
/third_party/node/deps/openssl/openssl/include/openssl/ |
H A D | store.h | 167 OSSL_STORE_INFO *OSSL_STORE_INFO_new_PUBKEY(EVP_PKEY *pubkey);
|
/third_party/openssl/include/openssl/ |
H A D | store.h | 167 OSSL_STORE_INFO *OSSL_STORE_INFO_new_PUBKEY(EVP_PKEY *pubkey);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
H A D | ieee802_11.c | 2972 struct wpabuf *buf, *pubkey = NULL, *wrapped_data_buf = NULL; in handle_auth_pasn_resp() local 3020 pubkey = crypto_ecdh_get_pubkey(sta->pasn->ecdh, 0); in handle_auth_pasn_resp() 3021 pubkey = wpabuf_zeropad(pubkey, in handle_auth_pasn_resp() 3023 if (!pubkey) { in handle_auth_pasn_resp() 3024 wpa_printf(MSG_DEBUG, "PASN: Failed to get pubkey"); in handle_auth_pasn_resp() 3030 pubkey, true, NULL, 0); in handle_auth_pasn_resp() 3037 wpabuf_free(pubkey); in handle_auth_pasn_resp() 3038 pubkey = NULL; in handle_auth_pasn_resp() 3111 wpabuf_free(pubkey); in handle_auth_pasn_resp() [all...] |
/third_party/node/deps/openssl/openssl/crypto/rsa/ |
H A D | rsa_ameth.c | 76 static int rsa_pub_decode(EVP_PKEY *pkey, const X509_PUBKEY *pubkey) in rsa_pub_decode() argument 83 if (!X509_PUBKEY_get0_param(NULL, &p, &pklen, &alg, pubkey)) in rsa_pub_decode()
|
/third_party/openssl/crypto/rsa/ |
H A D | rsa_ameth.c | 73 static int rsa_pub_decode(EVP_PKEY *pkey, const X509_PUBKEY *pubkey) in rsa_pub_decode() argument 80 if (!X509_PUBKEY_get0_param(NULL, &p, &pklen, &alg, pubkey)) in rsa_pub_decode()
|
/third_party/node/deps/openssl/openssl/ssl/ |
H A D | s3_lib.c | 4792 int ssl_derive(SSL *s, EVP_PKEY *privkey, EVP_PKEY *pubkey, int gensecret) in ssl_derive() argument 4799 if (privkey == NULL || pubkey == NULL) { in ssl_derive() 4807 || EVP_PKEY_derive_set_peer(pctx, pubkey) <= 0 in ssl_derive() 4895 int ssl_encapsulate(SSL *s, EVP_PKEY *pubkey, in ssl_encapsulate() argument 4904 if (pubkey == NULL) { in ssl_encapsulate() 4909 pctx = EVP_PKEY_CTX_new_from_pkey(s->ctx->libctx, pubkey, s->ctx->propq); in ssl_encapsulate()
|