/external/wpa_supplicant_8/src/crypto/ |
crypto_openssl.c | 416 struct wpabuf *pubkey = NULL, *privkey = NULL; local 438 pubkey = wpabuf_alloc(publen); 439 if (pubkey == NULL) 446 BN_bn2bin(dh->pub_key, wpabuf_put(pubkey, publen)); 450 *publ = pubkey; 454 wpabuf_free(pubkey);
|
/external/openssl/crypto/asn1/ |
x_pubkey.c | 77 X509_PUBKEY *pubkey = (X509_PUBKEY *)*pval; local 78 EVP_PKEY_free(pubkey->pkey);
|
t_req.c | 140 if (i2a_ASN1_OBJECT(bp, ri->pubkey->algor->algorithm) <= 0)
|
/external/openssl/crypto/rsa/ |
rsa_ameth.c | 85 static int rsa_pub_decode(EVP_PKEY *pkey, X509_PUBKEY *pubkey) 90 if (!X509_PUBKEY_get0_param(NULL, &p, &pklen, NULL, pubkey))
|
/external/wpa_supplicant_8/src/wps/ |
wps_common.c | 68 struct wpabuf *pubkey, *dh_shared; local 79 pubkey = wps->registrar ? wps->dh_pubkey_e : wps->dh_pubkey_r; 80 if (pubkey == NULL) { 86 wpa_hexdump_buf(MSG_DEBUG, "WPS: DH peer Public Key", pubkey); 87 dh_shared = dh5_derive_shared(wps->dh_ctx, pubkey, wps->dh_privkey);
|
/external/openssl/apps/ |
x509.c | 118 " -pubkey - output the public key\n", 195 int x509req=0,days=DEF_DAYS,modulus=0,pubkey=0; local 400 else if (strcmp(*argv,"-pubkey") == 0) 401 pubkey= ++num; 594 (req->req_info->pubkey == NULL) || 595 (req->req_info->pubkey->public_key == NULL) || 596 (req->req_info->pubkey->public_key->data == NULL)) 832 if (pubkey == i) [all...] |
req.c | 122 * -pubkey - output Public Key. 174 int nodes=0,kludge=0,newhdr=0,subject=0,pubkey=0; local 249 else if (strcmp(*argv,"-pubkey") == 0) 251 pubkey=1; 403 BIO_printf(bio_err," -pubkey output public key\n"); 953 if (noout && !text && !modulus && !subject && !pubkey) 982 if (pubkey) [all...] |
/external/openssl/crypto/dh/ |
dh_ameth.c | 71 static int dh_pub_decode(EVP_PKEY *pkey, X509_PUBKEY *pubkey) 83 if (!X509_PUBKEY_get0_param(NULL, &p, &pklen, &palg, pubkey)) 181 * is explcitly included and the pubkey must be recalculated.
|
/external/openssl/crypto/ec/ |
ec_ameth.c | 190 static int eckey_pub_decode(EVP_PKEY *pkey, X509_PUBKEY *pubkey) 198 if (!X509_PUBKEY_get0_param(NULL, &p, &pklen, &palg, pubkey))
|
/external/openssl/crypto/x509/ |
x509_req.c | 114 return(X509_PUBKEY_get(req->req_info->pubkey));
|
x509.h | 236 X509_PUBKEY *pubkey; member in struct:X509_req_info_st 533 X509_PUBKEY *pubkey; member in struct:Netscape_spkac_st 913 int X509_certificate_type(X509 *x,EVP_PKEY *pubkey /* optional */); [all...] |
/external/chromium/net/tools/testserver/ |
device_management.py | 598 pubkey = asn1der.Sequence([ algorithm, asn1der.Bitstring(rsa_pubkey) ]) 599 entry['public_key'] = pubkey;
|
/external/openssl/crypto/dsa/ |
dsa_ameth.c | 69 static int dsa_pub_decode(EVP_PKEY *pkey, X509_PUBKEY *pubkey) 81 if (!X509_PUBKEY_get0_param(NULL, &p, &pklen, &palg, pubkey)) 187 * AlgorithmIdentifier the pubkey must be recalculated.
|
/external/ipsec-tools/src/racoon/ |
eaytest.c | 137 char *pubkey = local 156 printf ("%s", pubkey); 172 printf("Verification with correct pubkey: "); 173 if (rsa_verify_with_pubkey (&src, sig, pubkey) != 0) { 182 printf("Verification with wrong pubkey: ");
|
/external/openssl/include/openssl/ |
x509.h | 236 X509_PUBKEY *pubkey; member in struct:X509_req_info_st 533 X509_PUBKEY *pubkey; member in struct:Netscape_spkac_st 913 int X509_certificate_type(X509 *x,EVP_PKEY *pubkey /* optional */); [all...] |
/external/dropbear/libtomcrypt/src/headers/ |
tomcrypt_pk.h | 203 ecc_point pubkey; member in struct:__anon5555
|
/external/dropbear/libtomcrypt/ |
crypt.tex | [all...] |