Home
last modified time | relevance | path

Searched +full:pk +full:- +full:pk (Results 1 – 25 of 410) sorted by relevance

12345678910>>...17

/freebsd/crypto/openssl/crypto/evp/
H A Dkeymgmt_lib.c2 * Copyright 2019-2024 The OpenSSL Project Authors. All Rights Reserved.
35 if (data->keydata == NULL) { in evp_keymgmt_util_try_import()
36 if ((data->keydata = evp_keymgmt_newdata(data->keymgmt)) == NULL) { in evp_keymgmt_util_try_import()
50 if (evp_keymgmt_import(data->keymgmt, data->keydata, data->selection, in evp_keymgmt_util_try_import()
54 evp_keymgmt_freedata(data->keymgmt, data->keydata); in evp_keymgmt_util_try_import()
55 data->keydat in evp_keymgmt_util_try_import()
87 evp_keymgmt_util_export(const EVP_PKEY * pk,int selection,OSSL_CALLBACK * export_cb,void * export_cbarg) evp_keymgmt_util_export() argument
96 evp_keymgmt_util_export_to_provider(EVP_PKEY * pk,EVP_KEYMGMT * keymgmt,int selection) evp_keymgmt_util_export_to_provider() argument
222 evp_keymgmt_util_clear_operation_cache(EVP_PKEY * pk,int locking) evp_keymgmt_util_clear_operation_cache() argument
236 evp_keymgmt_util_find_operation_cache(EVP_PKEY * pk,EVP_KEYMGMT * keymgmt,int selection) evp_keymgmt_util_find_operation_cache() argument
255 evp_keymgmt_util_cache_keydata(EVP_PKEY * pk,EVP_KEYMGMT * keymgmt,void * keydata,int selection) evp_keymgmt_util_cache_keydata() argument
288 evp_keymgmt_util_cache_keyinfo(EVP_PKEY * pk) evp_keymgmt_util_cache_keyinfo() argument
328 evp_keymgmt_util_has(EVP_PKEY * pk,int selection) evp_keymgmt_util_has() argument
[all...]
/freebsd/contrib/bearssl/tools/
H A Dxmem.c78 xpkeydup(const br_x509_pkey *pk) in xpkeydup() argument
83 pk2->key_type = pk->key_type; in xpkeydup()
84 switch (pk->key_type) { in xpkeydup()
86 pk2->key.rsa.n = xblobdup(pk->key.rsa.n, pk->key.rsa.nlen); in xpkeydup()
87 pk2->key.rsa.nlen = pk->key.rsa.nlen; in xpkeydup()
88 pk2->key.rsa.e = xblobdup(pk->key.rsa.e, pk->key.rsa.elen); in xpkeydup()
89 pk2->key.rsa.elen = pk->key.rsa.elen; in xpkeydup()
92 pk2->key.ec.curve = pk->key.ec.curve; in xpkeydup()
93 pk2->key.ec.q = xblobdup(pk->key.ec.q, pk->key.ec.qlen); in xpkeydup()
94 pk2->key.ec.qlen = pk->key.ec.qlen; in xpkeydup()
[all …]
H A Dverify.c35 rsa_bit_length(const br_rsa_public_key *pk) in rsa_bit_length() argument
40 for (u = 0; u < pk->nlen; u ++) { in rsa_bit_length()
41 if (pk->n[u] != 0) { in rsa_bit_length()
45 if (u == pk->nlen) { in rsa_bit_length()
48 bl = (unsigned)(pk->nlen - u - 1) << 3; in rsa_bit_length()
49 x = pk->n[u]; in rsa_bit_length()
58 print_rsa(const br_rsa_public_key *pk, int print_text, int print_C) in print_rsa() argument
64 for (u = 0; u < pk->nlen; u ++) { in print_rsa()
65 printf("%02X", pk->n[u]); in print_rsa()
69 for (u = 0; u < pk->elen; u ++) { in print_rsa()
[all …]
H A Dcerts.c45 br_x509_pkey *pk; in certificate_to_trust_anchor_inner() local
48 br_x509_decoder_push(&dc, xc->data, xc->data_len); in certificate_to_trust_anchor_inner()
49 pk = br_x509_decoder_get_pkey(&dc); in certificate_to_trust_anchor_inner()
50 if (pk == NULL) { in certificate_to_trust_anchor_inner()
54 return -1; in certificate_to_trust_anchor_inner()
56 ta->dn.data = VEC_TOARRAY(vdn); in certificate_to_trust_anchor_inner()
57 ta->dn.len = VEC_LEN(vdn); in certificate_to_trust_anchor_inner()
59 ta->flags = 0; in certificate_to_trust_anchor_inner()
61 ta->flags |= BR_X509_TA_CA; in certificate_to_trust_anchor_inner()
63 switch (pk->key_type) { in certificate_to_trust_anchor_inner()
[all …]
/freebsd/contrib/wpa/src/common/
H A Dsae_pk.c2 * SAE-PK
103 return d_permute(d_perm_table[val], iter - 1); in d_permute()
110 return 16 - val; in d_invert()
127 for (j = len - 1; j >= 0; j--) { in d_check_char()
153 /* SAE-PK password has at least three four character components in sae_pk_valid_password()
156 wpa_printf(MSG_DEBUG, "SAE-PK: Not a valid password (length)"); in sae_pk_valid_password()
162 if (pw[pos] != '-') { in sae_pk_valid_password()
164 "SAE-PK: Not a valid password (separator)"); in sae_pk_valid_password()
171 "SAE-PK: Not a valid password (character)"); in sae_pk_valid_password()
177 if (pw[pw_len - 1] != d_check_char(pw, pw_len - 1)) { in sae_pk_valid_password()
[all …]
/freebsd/contrib/libfido2/regress/
H A Dassert.c2 * Copyright (c) 2018-2023 Yubico AB. All rights reserved.
3 * Use of this source code is governed by a BSD-style
5 * SPDX-License-Identifier: BSD-2-Clause
172 es256_pk_t *pk; in alloc_es256_pk() local
174 pk = es256_pk_new(); in alloc_es256_pk()
175 assert(pk != NULL); in alloc_es256_pk()
177 return (pk); in alloc_es256_pk()
181 free_es256_pk(es256_pk_t * pk) free_es256_pk() argument
190 rs256_pk_t *pk; alloc_rs256_pk() local
199 free_rs256_pk(rs256_pk_t * pk) free_rs256_pk() argument
208 eddsa_pk_t *pk; alloc_eddsa_pk() local
217 free_eddsa_pk(eddsa_pk_t * pk) free_eddsa_pk() argument
349 es256_pk_t *pk; no_cdh() local
371 es256_pk_t *pk; no_rp() local
393 es256_pk_t *pk; no_authdata() local
414 es256_pk_t *pk; no_sig() local
436 es256_pk_t *pk; junk_cdh() local
465 es256_pk_t *pk; junk_rp() local
507 es256_pk_t *pk; junk_sig() local
536 es256_pk_t *pk; wrong_options() local
[all...]
/freebsd/contrib/libfido2/src/
H A Des384.c3 * Use of this source code is governed by a BSD-style
5 * SPDX-License-Identifier: BSD-2-Clause
28 return (-1); in decode_coord()
47 return (decode_coord(val, &k->x, sizeof(k->x))); in decode_pubkey_point()
49 return (decode_coord(val, &k->y, sizeof(k->y))); in decode_pubkey_point()
62 return (-1); in es384_pk_decode()
77 es384_pk_t *pk; in es384_pk_free() local
79 if (pkp == NULL || (pk = *pkp) == NULL) in es384_pk_free()
82 freezero(pk, sizeof(*pk)); in es384_pk_free()
87 es384_pk_from_ptr(es384_pk_t *pk, const void *ptr, size_t len) in es384_pk_from_ptr() argument
[all …]
H A Des256.c2 * Copyright (c) 2018-2022 Yubico AB. All rights reserved.
3 * Use of this source code is governed by a BSD-style
5 * SPDX-License-Identifier: BSD-2-Clause
30 return (-1); in decode_coord()
49 return (decode_coord(val, &k->x, sizeof(k->x))); in decode_pubkey_point()
51 return (decode_coord(val, &k->y, sizeof(k->y))); in decode_pubkey_point()
64 return (-1); in es256_pk_decode()
71 es256_pk_encode(const es256_pk_t *pk, int ecdh) in es256_pk_encode() argument
76 int ok = -1; in es256_pk_encode()
90 * "The COSEAlgorithmIdentifier used is -25 (ECDH-ES + in es256_pk_encode()
[all …]
H A Drs256.c2 * Copyright (c) 2018-2022 Yubico AB. All rights reserved.
3 * Use of this source code is governed by a BSD-style
5 * SPDX-License-Identifier: BSD-2-Clause
43 return (EVP_MD_fetch(NULL, "SHA2-256", NULL)); in rs256_get_EVP_MD()
77 return (-1); in decode_bignum()
96 return (decode_bignum(val, &k->n, sizeof(k->n))); in decode_rsa_pubkey()
98 return (decode_bignum(val, &k->e, sizeof(k->e))); in decode_rsa_pubkey()
111 return (-1); in rs256_pk_decode()
126 rs256_pk_t *pk; in rs256_pk_free() local
128 if (pkp == NULL || (pk = *pkp) == NULL) in rs256_pk_free()
[all …]
H A Deddsa.c2 * Copyright (c) 2019-2021 Yubico AB. All rights reserved.
3 * Use of this source code is governed by a BSD-style
5 * SPDX-License-Identifier: BSD-2-Clause
67 return (-1); in decode_coord()
86 return (decode_coord(val, &k->x, sizeof(k->x))); in decode_pubkey_point()
99 return (-1); in eddsa_pk_decode()
114 eddsa_pk_t *pk; in eddsa_pk_free() local
116 if (pkp == NULL || (pk = *pkp) == NULL) in eddsa_pk_free()
119 freezero(pk, sizeof(*pk)); in eddsa_pk_free()
124 eddsa_pk_from_ptr(eddsa_pk_t *pk, const void *ptr, size_t len) in eddsa_pk_from_ptr() argument
[all …]
/freebsd/crypto/openssl/test/
H A Devp_pkey_provided_test.c2 * Copyright 2019-2024 The OpenSSL Project Authors. All Rights Reserved.
43 for (i = *len, curr = buf, writ = buf; i > 0; i--, curr++) { in stripcr()
45 (*len)--; in stripcr()
138 return -1; in pass_cb_error()
141 static int test_print_key_using_pem(const char *alg, const EVP_PKEY *pk) in test_print_key_using_pem() argument
150 !TEST_true(PEM_write_bio_PrivateKey(bio_out, pk, EVP_aes_256_cbc(), in test_print_key_using_pem()
153 /* Output zero-length passphrase encrypted private key in PEM form */ in test_print_key_using_pem()
154 || !TEST_true(PEM_write_bio_PKCS8PrivateKey(bio_out, pk, in test_print_key_using_pem()
206 test_print_key_type_using_encoder(const char * alg,int type,const EVP_PKEY * pk) test_print_key_type_using_encoder() argument
314 test_print_key_using_encoder(const char * alg,const EVP_PKEY * pk) test_print_key_using_encoder() argument
327 test_print_key_using_encoder_public(const char * alg,const EVP_PKEY * pk) test_print_key_using_encoder_public() argument
353 EVP_PKEY *pk = NULL, *copy_pk = NULL, *dup_pk = NULL; test_fromdata_rsa() local
450 EVP_PKEY *pk = NULL; test_evp_pkey_get_bn_param_large() local
506 EVP_PKEY *pk = NULL, *copy_pk = NULL, *dup_pk = NULL; test_fromdata_dh_named_group() local
717 EVP_PKEY *pk = NULL, *dup_pk = NULL; test_fromdata_dh_fips186_4() local
911 EVP_PKEY *pk = NULL, *copy_pk = NULL, *dup_pk = NULL; test_fromdata_ecx() local
1170 EVP_PKEY *pk = NULL, *copy_pk = NULL, *dup_pk = NULL; test_fromdata_ec() local
1430 EVP_PKEY *pk = NULL, *copy_pk = NULL, *dup_pk = NULL; test_fromdata_dsa_fips186_4() local
[all...]
/freebsd/secure/lib/libcrypto/man/man3/
H A DEVP_PKEY_ASN1_METHOD.318 .\" Set up some character translations and predefined strings. \*(-- will
24 .tr \(*W-
27 . ds -- \(*W-
29 . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch
30 . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch
37 . ds -- \|\(em\|
71 .\" Fear. Run. Save yourself. No user-serviceable parts.
81 . ds #H ((1u-(\\\\n(.fu%2u))*.13m)
97 . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u"
98 . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u'
[all …]
/freebsd/crypto/openssl/crypto/dsa/
H A Ddsa_prn.c2 * Copyright 2006-2021 The OpenSSL Project Authors. All Rights Reserved.
55 EVP_PKEY *pk; in DSA_print() local
57 pk = EVP_PKEY_new(); in DSA_print()
58 if (pk == NULL) in DSA_print()
60 ret = EVP_PKEY_set1_DSA(pk, (DSA *)x); in DSA_print()
62 ret = EVP_PKEY_print_private(bp, pk, off, NULL); in DSA_print()
63 EVP_PKEY_free(pk); in DSA_print()
69 EVP_PKEY *pk; in DSAparams_print() local
71 pk = EVP_PKEY_new(); in DSAparams_print()
72 if (pk == NULL) in DSAparams_print()
[all …]
/freebsd/crypto/openssl/doc/man3/
H A DEVP_PKEY_ASN1_METHOD.pod27 - manipulating and registering EVP_PKEY_ASN1_METHOD structure
45 int (*pub_decode) (EVP_PKEY *pk,
48 const EVP_PKEY *pk),
54 int (*pkey_size) (const EVP_PKEY *pk),
55 int (*pkey_bits) (const EVP_PKEY *pk));
57 int (*priv_decode) (EVP_PKEY *pk,
61 const EVP_PKEY *pk),
72 int (*param_missing) (const EVP_PKEY *pk),
107 int (*pkey_check) (const EVP_PKEY *pk));
110 int (*pkey_pub_check) (const EVP_PKEY *pk));
[all …]
/freebsd/sys/contrib/libsodium/src/libsodium/crypto_box/curve25519xchacha20poly1305/
H A Dbox_curve25519xchacha20poly1305.c18 crypto_box_curve25519xchacha20poly1305_seed_keypair(unsigned char *pk, in crypto_box_curve25519xchacha20poly1305_seed_keypair() argument
28 return crypto_scalarmult_curve25519_base(pk, sk); in crypto_box_curve25519xchacha20poly1305_seed_keypair()
32 crypto_box_curve25519xchacha20poly1305_keypair(unsigned char *pk, in crypto_box_curve25519xchacha20poly1305_keypair() argument
37 return crypto_scalarmult_curve25519_base(pk, sk); in crypto_box_curve25519xchacha20poly1305_keypair()
42 const unsigned char *pk, in crypto_box_curve25519xchacha20poly1305_beforenm() argument
48 if (crypto_scalarmult_curve25519(s, sk, pk) != 0) { in crypto_box_curve25519xchacha20poly1305_beforenm()
49 return -1; in crypto_box_curve25519xchacha20poly1305_beforenm()
65 unsigned long long mlen, const unsigned char *n, const unsigned char *pk, in crypto_box_curve25519xchacha20poly1305_detached() argument
73 if (crypto_box_curve25519xchacha20poly1305_beforenm(k, pk, sk) != 0) { in crypto_box_curve25519xchacha20poly1305_detached()
74 return -1; in crypto_box_curve25519xchacha20poly1305_detached()
[all …]
/freebsd/crypto/openssl/include/crypto/
H A Dasn1.h2 * Copyright 2015-2021 The OpenSSL Project Authors. All Rights Reserved.
29 int (*pub_decode) (EVP_PKEY *pk, const X509_PUBKEY *pub);
30 int (*pub_encode) (X509_PUBKEY *pub, const EVP_PKEY *pk);
34 int (*priv_decode) (EVP_PKEY *pk, const PKCS8_PRIV_KEY_INFO *p8inf);
35 int (*priv_encode) (PKCS8_PRIV_KEY_INFO *p8, const EVP_PKEY *pk);
38 int (*pkey_size) (const EVP_PKEY *pk);
39 int (*pkey_bits) (const EVP_PKEY *pk);
40 int (*pkey_security_bits) (const EVP_PKEY *pk);
44 int (*param_missing) (const EVP_PKEY *pk);
68 int (*pkey_check) (const EVP_PKEY *pk);
[all …]
/freebsd/crypto/openssl/doc/internal/man3/
H A Devp_keymgmt_util_export_to_provider.pod13 - internal KEYMGMT utility functions
21 int evp_keymgmt_util_export(const EVP_PKEY *pk, int selection,
23 void *evp_keymgmt_util_export_to_provider(EVP_PKEY *pk, EVP_KEYMGMT *keymgmt,
25 OP_CACHE_ELEM *evp_keymgmt_util_find_operation_cache(EVP_PKEY *pk,
28 int evp_keymgmt_util_clear_operation_cache(EVP_PKEY *pk, int locking);
29 int evp_keymgmt_util_cache_keydata(EVP_PKEY *pk, EVP_KEYMGMT *keymgmt,
31 void evp_keymgmt_util_cache_keyinfo(EVP_PKEY *pk);
38 I<keymgmt> and I<keydata> from I<pk>. This is used as a
42 (provider side key material) from the given key I<pk> to a provider
44 It maintains a cache of provider key references in I<pk> to keep track
[all …]
/freebsd/contrib/libfido2/fuzz/
H A Dfuzz_assert.c2 * Copyright (c) 2019-2023 Yubico AB. All rights reserved.
3 * Use of this source code is governed by a BSD-style
5 * SPDX-License-Identifier: BSD-2-Clause
19 #include "../openbsd-compat/openbsd-compat.h"
71 int ok = -1; in unpack()
82 if (unpack_byte(v[0], &p->u in unpack()
256 verify_assert(int type,const unsigned char * cdh_ptr,size_t cdh_len,const char * rp_id,const unsigned char * authdata_ptr,size_t authdata_len,const unsigned char * sig_ptr,size_t sig_len,uint8_t up,uint8_t uv,int ext,void * pk) verify_assert() argument
303 es256_pk_t *pk = NULL; es256_convert() local
324 es384_pk_t *pk = NULL; es384_convert() local
345 rs256_pk_t *pk = NULL; rs256_convert() local
366 eddsa_pk_t *pk = NULL; eddsa_convert() local
393 void *pk; test() local
[all...]
/freebsd/contrib/libfido2/examples/
H A Dutil.c2 * Copyright (c) 2018-2022 Yubico AB. All rights reserved.
3 * Use of this source code is governed by a BSD-style
5 * SPDX-License-Identifier: BSD-2-Clause
30 #include "../openbsd-compat/posix_win.h"
32 #include "../openbsd-compat/openbsd-compat.h"
42 return (-1); in base10()
44 return (-1); in base10()
46 return (-1); in base10()
54 int fd, ok = -1; in write_blob()
73 if (fd != -1) { in write_blob()
[all …]
/freebsd/sys/contrib/libsodium/src/libsodium/crypto_box/curve25519xsalsa20poly1305/
H A Dbox_curve25519xsalsa20poly1305.c12 crypto_box_curve25519xsalsa20poly1305_seed_keypair(unsigned char *pk, in crypto_box_curve25519xsalsa20poly1305_seed_keypair() argument
22 return crypto_scalarmult_curve25519_base(pk, sk); in crypto_box_curve25519xsalsa20poly1305_seed_keypair()
26 crypto_box_curve25519xsalsa20poly1305_keypair(unsigned char *pk, in crypto_box_curve25519xsalsa20poly1305_keypair() argument
31 return crypto_scalarmult_curve25519_base(pk, sk); in crypto_box_curve25519xsalsa20poly1305_keypair()
36 const unsigned char *pk, in crypto_box_curve25519xsalsa20poly1305_beforenm() argument
42 if (crypto_scalarmult_curve25519(s, sk, pk) != 0) { in crypto_box_curve25519xsalsa20poly1305_beforenm()
43 return -1; in crypto_box_curve25519xsalsa20poly1305_beforenm()
72 const unsigned char *pk, in crypto_box_curve25519xsalsa20poly1305() argument
78 if (crypto_box_curve25519xsalsa20poly1305_beforenm(k, pk, sk) != 0) { in crypto_box_curve25519xsalsa20poly1305()
79 return -1; in crypto_box_curve25519xsalsa20poly1305()
[all …]
/freebsd/sys/contrib/libsodium/src/libsodium/crypto_sign/ed25519/ref10/
H A Dopen.c17 const unsigned char *pk, in _crypto_sign_ed25519_verify_detached() argument
28 return -1; in _crypto_sign_ed25519_verify_detached()
33 return -1; in _crypto_sign_ed25519_verify_detached()
35 if (ge25519_is_canonical(pk) == 0 || in _crypto_sign_ed25519_verify_detached()
36 ge25519_has_small_order(pk) != 0) { in _crypto_sign_ed25519_verify_detached()
37 return -1; in _crypto_sign_ed25519_verify_detached()
40 if (ge25519_frombytes_negate_vartime(&A, pk) != 0) { in _crypto_sign_ed25519_verify_detached()
41 return -1; in _crypto_sign_ed25519_verify_detached()
45 crypto_hash_sha512_update(&hs, pk, 32); in _crypto_sign_ed25519_verify_detached()
53 return crypto_verify_32(rcheck, sig) | (-(rcheck == sig)) | in _crypto_sign_ed25519_verify_detached()
[all …]
/freebsd/sys/contrib/libsodium/src/libsodium/include/sodium/
H A Dcrypto_box.h5 * THREAD SAFETY: crypto_box_keypair() is thread-safe,
8 * Other functions are always thread-safe.
18 # pragma GCC diagnostic ignored "-Wlong-long"
52 int crypto_box_seed_keypair(unsigned char *pk, unsigned char *sk,
56 int crypto_box_keypair(unsigned char *pk, unsigned char *sk);
61 const unsigned char *pk, const unsigned char *sk)
67 const unsigned char *pk, const unsigned char *sk)
73 const unsigned char *n, const unsigned char *pk,
82 const unsigned char *pk,
86 /* -- Precomputation interface -- */
[all …]
H A Dcrypto_box_curve25519xchacha20poly1305.h11 # pragma GCC diagnostic ignored "-Wlong-long"
41 (crypto_stream_xchacha20_MESSAGEBYTES_MAX - crypto_box_curve25519xchacha20poly1305_MACBYTES)
46 int crypto_box_curve25519xchacha20poly1305_seed_keypair(unsigned char *pk,
51 int crypto_box_curve25519xchacha20poly1305_keypair(unsigned char *pk,
59 const unsigned char *pk,
68 const unsigned char *pk,
78 const unsigned char *pk,
88 const unsigned char *pk,
92 /* -- Precomputation interface -- */
96 const unsigned char *pk,
[all …]
/freebsd/contrib/bearssl/src/x509/
H A Dencode_ec_rawder.c53 const br_ec_private_key *sk, const br_ec_public_key *pk, in br_encode_ec_raw_der_inner() argument
70 * The value of the 'privateKey' field is the raw unsigned big-endian in br_encode_ec_raw_der_inner()
77 * by the unsigned big-endian encodings of the X and Y coordinates, in br_encode_ec_raw_der_inner()
86 oid = br_get_curve_OID(sk->curve); in br_encode_ec_raw_der_inner()
94 len_privateKey = 1 + len_of_len(sk->xlen) + sk->xlen; in br_encode_ec_raw_der_inner()
100 if (pk == NULL) { in br_encode_ec_raw_der_inner()
104 len_publicKey_bits = 2 + len_of_len(pk->qlen) + pk->qlen; in br_encode_ec_raw_der_inner()
127 buf += br_asn1_encode_length(buf, sk->xlen); in br_encode_ec_raw_der_inner()
128 memcpy(buf, sk->x, sk->xlen); in br_encode_ec_raw_der_inner()
129 buf += sk->xlen; in br_encode_ec_raw_der_inner()
[all …]
/freebsd/contrib/libfido2/man/
H A Drs256_pk_new.31 .\" Copyright (c) 2018-2022 Yubico AB. All rights reserved.
26 .\" SPDX-License-Identifier: BSD-2-Clause
47 .Fn rs256_pk_from_EVP_PKEY "rs256_pk_t *pk" "const EVP_PKEY *pkey"
49 .Fn rs256_pk_from_RSA "rs256_pk_t *pk" "const RSA *rsa"
51 .Fn rs256_pk_from_ptr "rs256_pk_t *pk" "const void *ptr" "size_t len"
53 .Fn rs256_pk_to_EVP_PKEY "const rs256_pk_t *pk"
56 (COSE) RFC to PKCS#1.5 2048-bit RSA with SHA-256.
100 .Fa pk
110 .Fa pk
120 .Fa pk
[all …]

12345678910>>...17