/external/openssl/crypto/asn1/ |
x_pubkey.c | 77 X509_PUBKEY *pubkey = (X509_PUBKEY *)*pval; local 78 EVP_PKEY_free(pubkey->pkey);
|
/external/dropbear/libtomcrypt/src/pk/ecc/ |
ecc_sign_hash.c | 41 ecc_key pubkey; local 74 if ((err = ecc_make_key_ex(prng, wprng, &pubkey, key->dp)) != CRYPT_OK) { 79 if ((err = mp_mod(pubkey.pubkey.x, p, r)) != CRYPT_OK) { goto error; } 82 ecc_free(&pubkey); 85 if ((err = mp_invmod(pubkey.k, p, pubkey.k)) != CRYPT_OK) { goto error; } /* k = 1/k */ 89 if ((err = mp_mulmod(s, pubkey.k, p, s)) != CRYPT_OK) { goto error; } /* s = (e + xr)/k */ 90 ecc_free(&pubkey); 104 ecc_free(&pubkey); [all...] |
ecc_encrypt_key.c | 44 ecc_key pubkey; local 67 if ((err = ecc_make_key_ex(prng, wprng, &pubkey, key->dp)) != CRYPT_OK) { 84 ecc_free(&pubkey); 89 if ((err = ecc_export(pub_expt, &pubkeysize, PK_PUBLIC, &pubkey)) != CRYPT_OK) { 90 ecc_free(&pubkey); 96 if ((err = ecc_shared_secret(&pubkey, key, ecc_shared, &x)) != CRYPT_OK) { 97 ecc_free(&pubkey); 100 ecc_free(&pubkey);
|
ecc_decrypt_key.c | 42 ecc_key pubkey; local 94 if ((err = ecc_import(decode[1].data, decode[1].size, &pubkey)) != CRYPT_OK) { 100 if ((err = ecc_shared_secret(key, &pubkey, ecc_shared, &x)) != CRYPT_OK) { 101 ecc_free(&pubkey); 104 ecc_free(&pubkey);
|
/external/openssl/apps/ |
spkac.c | 87 int verify=0,noout=0,pubkey=0; local 156 else if (strcmp(*argv,"-pubkey") == 0) 157 pubkey=1; 177 BIO_printf(bio_err," -pubkey output public key\n"); 295 if(pubkey) PEM_write_bio_PUBKEY(out, pkey);
|
req.c | 122 * -pubkey - output Public Key. 174 int nodes=0,kludge=0,newhdr=0,subject=0,pubkey=0; local 249 else if (strcmp(*argv,"-pubkey") == 0) 251 pubkey=1; 403 BIO_printf(bio_err," -pubkey output public key\n"); 953 if (noout && !text && !modulus && !subject && !pubkey) 982 if (pubkey) [all...] |
x509.c | 118 " -pubkey - output the public key\n", 195 int x509req=0,days=DEF_DAYS,modulus=0,pubkey=0; local 400 else if (strcmp(*argv,"-pubkey") == 0) 401 pubkey= ++num; 594 (req->req_info->pubkey == NULL) || 595 (req->req_info->pubkey->public_key == NULL) || 596 (req->req_info->pubkey->public_key->data == NULL)) 832 if (pubkey == i) [all...] |
/external/openssl/crypto/ec/ |
ec_pmeth.c | 174 const EC_POINT *pubkey = NULL; local 189 pubkey = EC_KEY_get0_public_key(ctx->peerkey->pkey.ec); 197 ret = ECDH_compute_key(key, outlen, pubkey, ctx->pkey->pkey.ec, 0);
|
/external/wpa_supplicant_6/wpa_supplicant/src/wps/ |
wps_attr_build.c | 26 struct wpabuf *pubkey; local 29 pubkey = dh_init(dh_groups_get(WPS_DH_GROUP), &wps->dh_privkey); 30 pubkey = wpabuf_zeropad(pubkey, 192); 31 if (pubkey == NULL) { 38 wpabuf_put_be16(msg, wpabuf_len(pubkey)); 39 wpabuf_put_buf(msg, pubkey); 43 wps->dh_pubkey_r = pubkey; 46 wps->dh_pubkey_e = pubkey;
|
wps_common.c | 66 struct wpabuf *pubkey, *dh_shared; local 77 pubkey = wps->registrar ? wps->dh_pubkey_e : wps->dh_pubkey_r; 78 if (pubkey == NULL) { 83 dh_shared = dh_derive_shared(pubkey, wps->dh_privkey,
|
/external/bouncycastle/src/main/java/org/bouncycastle/jce/netscape/ |
NetscapeCertRequest.java | 52 PublicKey pubkey ; field in class:NetscapeCertRequest 119 pubkey = KeyFactory.getInstance(keyAlg.getObjectId().getId(), "BC") 138 pubkey = pub_key; 142 //content_der.add(new SubjectPublicKeyInfo(sigAlg, new RSAPublicKeyStructure(pubkey.getModulus(), pubkey.getPublicExponent()).getDERObject())); 180 return pubkey; 185 pubkey = value; 202 sig.initVerify(pubkey); 258 baos.write(pubkey.getEncoded());
|
/external/wpa_supplicant_8/src/wps/ |
wps_attr_build.c | 29 struct wpabuf *pubkey; local 38 pubkey = wpabuf_dup(wps->wps->dh_pubkey); 43 wps->dh_ctx = dh5_init(&wps->dh_privkey, &pubkey); 44 pubkey = wpabuf_zeropad(pubkey, 192); 46 if (wps->dh_ctx == NULL || wps->dh_privkey == NULL || pubkey == NULL) { 49 wpabuf_free(pubkey); 53 wpa_hexdump_buf(MSG_DEBUG, "WPS: DH own Public Key", pubkey); 56 wpabuf_put_be16(msg, wpabuf_len(pubkey)); 57 wpabuf_put_buf(msg, pubkey); [all...] |
wps_common.c | 68 struct wpabuf *pubkey, *dh_shared; local 79 pubkey = wps->registrar ? wps->dh_pubkey_e : wps->dh_pubkey_r; 80 if (pubkey == NULL) { 86 wpa_hexdump_buf(MSG_DEBUG, "WPS: DH peer Public Key", pubkey); 87 dh_shared = dh5_derive_shared(wps->dh_ctx, pubkey, wps->dh_privkey);
|
/external/wpa_supplicant_8/src/crypto/ |
crypto_openssl.c | 416 struct wpabuf *pubkey = NULL, *privkey = NULL; local 438 pubkey = wpabuf_alloc(publen); 439 if (pubkey == NULL) 446 BN_bn2bin(dh->pub_key, wpabuf_put(pubkey, publen)); 450 *publ = pubkey; 454 wpabuf_free(pubkey);
|
/external/dropbear/libtomcrypt/src/headers/ |
tomcrypt_pk.h | 203 ecc_point pubkey; member in struct:__anon5558
|
/external/ipsec-tools/src/racoon/ |
eaytest.c | 137 char *pubkey = local 156 printf ("%s", pubkey); 172 printf("Verification with correct pubkey: "); 173 if (rsa_verify_with_pubkey (&src, sig, pubkey) != 0) { 182 printf("Verification with wrong pubkey: ");
|
/external/openssl/crypto/x509/ |
x509.h | 236 X509_PUBKEY *pubkey; member in struct:X509_req_info_st 533 X509_PUBKEY *pubkey; member in struct:Netscape_spkac_st 913 int X509_certificate_type(X509 *x,EVP_PKEY *pubkey /* optional */); [all...] |
/external/openssl/include/openssl/ |
x509.h | 236 X509_PUBKEY *pubkey; member in struct:X509_req_info_st 533 X509_PUBKEY *pubkey; member in struct:Netscape_spkac_st 913 int X509_certificate_type(X509 *x,EVP_PKEY *pubkey /* optional */); [all...] |