/freebsd/crypto/openssl/crypto/evp/ |
H A D | keymgmt_lib.c | 2 * Copyright 2019-2024 The OpenSSL Project Authors. All Rights Reserved. 35 if (data->keydata == NULL) { in evp_keymgmt_util_try_import() 36 if ((data->keydata = evp_keymgmt_newdata(data->keymgmt)) == NULL) { in evp_keymgmt_util_try_import() 50 if (evp_keymgmt_import(data->keymgmt, data->keydata, data->selection, in evp_keymgmt_util_try_import() 54 evp_keymgmt_freedata(data->keymgmt, data->keydata); in evp_keymgmt_util_try_import() 55 data->keydat in evp_keymgmt_util_try_import() 87 evp_keymgmt_util_export(const EVP_PKEY * pk,int selection,OSSL_CALLBACK * export_cb,void * export_cbarg) evp_keymgmt_util_export() argument 96 evp_keymgmt_util_export_to_provider(EVP_PKEY * pk,EVP_KEYMGMT * keymgmt,int selection) evp_keymgmt_util_export_to_provider() argument 222 evp_keymgmt_util_clear_operation_cache(EVP_PKEY * pk,int locking) evp_keymgmt_util_clear_operation_cache() argument 236 evp_keymgmt_util_find_operation_cache(EVP_PKEY * pk,EVP_KEYMGMT * keymgmt,int selection) evp_keymgmt_util_find_operation_cache() argument 255 evp_keymgmt_util_cache_keydata(EVP_PKEY * pk,EVP_KEYMGMT * keymgmt,void * keydata,int selection) evp_keymgmt_util_cache_keydata() argument 288 evp_keymgmt_util_cache_keyinfo(EVP_PKEY * pk) evp_keymgmt_util_cache_keyinfo() argument 328 evp_keymgmt_util_has(EVP_PKEY * pk,int selection) evp_keymgmt_util_has() argument [all...] |
/freebsd/contrib/bearssl/tools/ |
H A D | xmem.c | 78 xpkeydup(const br_x509_pkey *pk) in xpkeydup() argument 83 pk2->key_type = pk->key_type; in xpkeydup() 84 switch (pk->key_type) { in xpkeydup() 86 pk2->key.rsa.n = xblobdup(pk->key.rsa.n, pk->key.rsa.nlen); in xpkeydup() 87 pk2->key.rsa.nlen = pk->key.rsa.nlen; in xpkeydup() 88 pk2->key.rsa.e = xblobdup(pk->key.rsa.e, pk->key.rsa.elen); in xpkeydup() 89 pk2->key.rsa.elen = pk->key.rsa.elen; in xpkeydup() 92 pk2->key.ec.curve = pk->key.ec.curve; in xpkeydup() 93 pk2->key.ec.q = xblobdup(pk->key.ec.q, pk->key.ec.qlen); in xpkeydup() 94 pk2->key.ec.qlen = pk->key.ec.qlen; in xpkeydup() [all …]
|
H A D | verify.c | 35 rsa_bit_length(const br_rsa_public_key *pk) in rsa_bit_length() argument 40 for (u = 0; u < pk->nlen; u ++) { in rsa_bit_length() 41 if (pk->n[u] != 0) { in rsa_bit_length() 45 if (u == pk->nlen) { in rsa_bit_length() 48 bl = (unsigned)(pk->nlen - u - 1) << 3; in rsa_bit_length() 49 x = pk->n[u]; in rsa_bit_length() 58 print_rsa(const br_rsa_public_key *pk, int print_text, int print_C) in print_rsa() argument 64 for (u = 0; u < pk->nlen; u ++) { in print_rsa() 65 printf("%02X", pk->n[u]); in print_rsa() 69 for (u = 0; u < pk->elen; u ++) { in print_rsa() [all …]
|
H A D | certs.c | 45 br_x509_pkey *pk; in certificate_to_trust_anchor_inner() local 48 br_x509_decoder_push(&dc, xc->data, xc->data_len); in certificate_to_trust_anchor_inner() 49 pk = br_x509_decoder_get_pkey(&dc); in certificate_to_trust_anchor_inner() 50 if (pk == NULL) { in certificate_to_trust_anchor_inner() 54 return -1; in certificate_to_trust_anchor_inner() 56 ta->dn.data = VEC_TOARRAY(vdn); in certificate_to_trust_anchor_inner() 57 ta->dn.len = VEC_LEN(vdn); in certificate_to_trust_anchor_inner() 59 ta->flags = 0; in certificate_to_trust_anchor_inner() 61 ta->flags |= BR_X509_TA_CA; in certificate_to_trust_anchor_inner() 63 switch (pk->key_type) { in certificate_to_trust_anchor_inner() [all …]
|
/freebsd/contrib/wpa/src/common/ |
H A D | sae_pk.c | 2 * SAE-PK 103 return d_permute(d_perm_table[val], iter - 1); in d_permute() 110 return 16 - val; in d_invert() 127 for (j = len - 1; j >= 0; j--) { in d_check_char() 153 /* SAE-PK password has at least three four character components in sae_pk_valid_password() 156 wpa_printf(MSG_DEBUG, "SAE-PK: Not a valid password (length)"); in sae_pk_valid_password() 162 if (pw[pos] != '-') { in sae_pk_valid_password() 164 "SAE-PK: Not a valid password (separator)"); in sae_pk_valid_password() 171 "SAE-PK: Not a valid password (character)"); in sae_pk_valid_password() 177 if (pw[pw_len - 1] != d_check_char(pw, pw_len - 1)) { in sae_pk_valid_password() [all …]
|
/freebsd/contrib/libfido2/regress/ |
H A D | assert.c | 2 * Copyright (c) 2018-2023 Yubico AB. All rights reserved. 3 * Use of this source code is governed by a BSD-style 5 * SPDX-License-Identifier: BSD-2-Clause 172 es256_pk_t *pk; in alloc_es256_pk() local 174 pk = es256_pk_new(); in alloc_es256_pk() 175 assert(pk != NULL); in alloc_es256_pk() 177 return (pk); in alloc_es256_pk() 181 free_es256_pk(es256_pk_t * pk) free_es256_pk() argument 190 rs256_pk_t *pk; alloc_rs256_pk() local 199 free_rs256_pk(rs256_pk_t * pk) free_rs256_pk() argument 208 eddsa_pk_t *pk; alloc_eddsa_pk() local 217 free_eddsa_pk(eddsa_pk_t * pk) free_eddsa_pk() argument 349 es256_pk_t *pk; no_cdh() local 371 es256_pk_t *pk; no_rp() local 393 es256_pk_t *pk; no_authdata() local 414 es256_pk_t *pk; no_sig() local 436 es256_pk_t *pk; junk_cdh() local 465 es256_pk_t *pk; junk_rp() local 507 es256_pk_t *pk; junk_sig() local 536 es256_pk_t *pk; wrong_options() local [all...] |
/freebsd/contrib/libfido2/src/ |
H A D | es384.c | 3 * Use of this source code is governed by a BSD-style 5 * SPDX-License-Identifier: BSD-2-Clause 28 return (-1); in decode_coord() 47 return (decode_coord(val, &k->x, sizeof(k->x))); in decode_pubkey_point() 49 return (decode_coord(val, &k->y, sizeof(k->y))); in decode_pubkey_point() 62 return (-1); in es384_pk_decode() 77 es384_pk_t *pk; in es384_pk_free() local 79 if (pkp == NULL || (pk = *pkp) == NULL) in es384_pk_free() 82 freezero(pk, sizeof(*pk)); in es384_pk_free() 87 es384_pk_from_ptr(es384_pk_t *pk, const void *ptr, size_t len) in es384_pk_from_ptr() argument [all …]
|
H A D | es256.c | 2 * Copyright (c) 2018-2022 Yubico AB. All rights reserved. 3 * Use of this source code is governed by a BSD-style 5 * SPDX-License-Identifier: BSD-2-Clause 30 return (-1); in decode_coord() 49 return (decode_coord(val, &k->x, sizeof(k->x))); in decode_pubkey_point() 51 return (decode_coord(val, &k->y, sizeof(k->y))); in decode_pubkey_point() 64 return (-1); in es256_pk_decode() 71 es256_pk_encode(const es256_pk_t *pk, int ecdh) in es256_pk_encode() argument 76 int ok = -1; in es256_pk_encode() 90 * "The COSEAlgorithmIdentifier used is -25 (ECDH-ES + in es256_pk_encode() [all …]
|
H A D | rs256.c | 2 * Copyright (c) 2018-2022 Yubico AB. All rights reserved. 3 * Use of this source code is governed by a BSD-style 5 * SPDX-License-Identifier: BSD-2-Clause 43 return (EVP_MD_fetch(NULL, "SHA2-256", NULL)); in rs256_get_EVP_MD() 77 return (-1); in decode_bignum() 96 return (decode_bignum(val, &k->n, sizeof(k->n))); in decode_rsa_pubkey() 98 return (decode_bignum(val, &k->e, sizeof(k->e))); in decode_rsa_pubkey() 111 return (-1); in rs256_pk_decode() 126 rs256_pk_t *pk; in rs256_pk_free() local 128 if (pkp == NULL || (pk = *pkp) == NULL) in rs256_pk_free() [all …]
|
H A D | eddsa.c | 2 * Copyright (c) 2019-2021 Yubico AB. All rights reserved. 3 * Use of this source code is governed by a BSD-style 5 * SPDX-License-Identifier: BSD-2-Clause 67 return (-1); in decode_coord() 86 return (decode_coord(val, &k->x, sizeof(k->x))); in decode_pubkey_point() 99 return (-1); in eddsa_pk_decode() 114 eddsa_pk_t *pk; in eddsa_pk_free() local 116 if (pkp == NULL || (pk = *pkp) == NULL) in eddsa_pk_free() 119 freezero(pk, sizeof(*pk)); in eddsa_pk_free() 124 eddsa_pk_from_ptr(eddsa_pk_t *pk, const void *ptr, size_t len) in eddsa_pk_from_ptr() argument [all …]
|
/freebsd/crypto/openssl/test/ |
H A D | evp_pkey_provided_test.c | 2 * Copyright 2019-2024 The OpenSSL Project Authors. All Rights Reserved. 43 for (i = *len, curr = buf, writ = buf; i > 0; i--, curr++) { in stripcr() 45 (*len)--; in stripcr() 138 return -1; in pass_cb_error() 141 static int test_print_key_using_pem(const char *alg, const EVP_PKEY *pk) in test_print_key_using_pem() argument 150 !TEST_true(PEM_write_bio_PrivateKey(bio_out, pk, EVP_aes_256_cbc(), in test_print_key_using_pem() 153 /* Output zero-length passphrase encrypted private key in PEM form */ in test_print_key_using_pem() 154 || !TEST_true(PEM_write_bio_PKCS8PrivateKey(bio_out, pk, in test_print_key_using_pem() 206 test_print_key_type_using_encoder(const char * alg,int type,const EVP_PKEY * pk) test_print_key_type_using_encoder() argument 314 test_print_key_using_encoder(const char * alg,const EVP_PKEY * pk) test_print_key_using_encoder() argument 327 test_print_key_using_encoder_public(const char * alg,const EVP_PKEY * pk) test_print_key_using_encoder_public() argument 353 EVP_PKEY *pk = NULL, *copy_pk = NULL, *dup_pk = NULL; test_fromdata_rsa() local 450 EVP_PKEY *pk = NULL; test_evp_pkey_get_bn_param_large() local 506 EVP_PKEY *pk = NULL, *copy_pk = NULL, *dup_pk = NULL; test_fromdata_dh_named_group() local 717 EVP_PKEY *pk = NULL, *dup_pk = NULL; test_fromdata_dh_fips186_4() local 911 EVP_PKEY *pk = NULL, *copy_pk = NULL, *dup_pk = NULL; test_fromdata_ecx() local 1170 EVP_PKEY *pk = NULL, *copy_pk = NULL, *dup_pk = NULL; test_fromdata_ec() local 1430 EVP_PKEY *pk = NULL, *copy_pk = NULL, *dup_pk = NULL; test_fromdata_dsa_fips186_4() local [all...] |
/freebsd/secure/lib/libcrypto/man/man3/ |
H A D | EVP_PKEY_ASN1_METHOD.3 | 18 .\" Set up some character translations and predefined strings. \*(-- will 24 .tr \(*W- 27 . ds -- \(*W- 29 . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch 30 . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch 37 . ds -- \|\(em\| 71 .\" Fear. Run. Save yourself. No user-serviceable parts. 81 . ds #H ((1u-(\\\\n(.fu%2u))*.13m) 97 . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u" 98 . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u' [all …]
|
/freebsd/crypto/openssl/crypto/dsa/ |
H A D | dsa_prn.c | 2 * Copyright 2006-2021 The OpenSSL Project Authors. All Rights Reserved. 55 EVP_PKEY *pk; in DSA_print() local 57 pk = EVP_PKEY_new(); in DSA_print() 58 if (pk == NULL) in DSA_print() 60 ret = EVP_PKEY_set1_DSA(pk, (DSA *)x); in DSA_print() 62 ret = EVP_PKEY_print_private(bp, pk, off, NULL); in DSA_print() 63 EVP_PKEY_free(pk); in DSA_print() 69 EVP_PKEY *pk; in DSAparams_print() local 71 pk = EVP_PKEY_new(); in DSAparams_print() 72 if (pk == NULL) in DSAparams_print() [all …]
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | EVP_PKEY_ASN1_METHOD.pod | 27 - manipulating and registering EVP_PKEY_ASN1_METHOD structure 45 int (*pub_decode) (EVP_PKEY *pk, 48 const EVP_PKEY *pk), 54 int (*pkey_size) (const EVP_PKEY *pk), 55 int (*pkey_bits) (const EVP_PKEY *pk)); 57 int (*priv_decode) (EVP_PKEY *pk, 61 const EVP_PKEY *pk), 72 int (*param_missing) (const EVP_PKEY *pk), 107 int (*pkey_check) (const EVP_PKEY *pk)); 110 int (*pkey_pub_check) (const EVP_PKEY *pk)); [all …]
|
/freebsd/sys/contrib/libsodium/src/libsodium/crypto_box/curve25519xchacha20poly1305/ |
H A D | box_curve25519xchacha20poly1305.c | 18 crypto_box_curve25519xchacha20poly1305_seed_keypair(unsigned char *pk, in crypto_box_curve25519xchacha20poly1305_seed_keypair() argument 28 return crypto_scalarmult_curve25519_base(pk, sk); in crypto_box_curve25519xchacha20poly1305_seed_keypair() 32 crypto_box_curve25519xchacha20poly1305_keypair(unsigned char *pk, in crypto_box_curve25519xchacha20poly1305_keypair() argument 37 return crypto_scalarmult_curve25519_base(pk, sk); in crypto_box_curve25519xchacha20poly1305_keypair() 42 const unsigned char *pk, in crypto_box_curve25519xchacha20poly1305_beforenm() argument 48 if (crypto_scalarmult_curve25519(s, sk, pk) != 0) { in crypto_box_curve25519xchacha20poly1305_beforenm() 49 return -1; in crypto_box_curve25519xchacha20poly1305_beforenm() 65 unsigned long long mlen, const unsigned char *n, const unsigned char *pk, in crypto_box_curve25519xchacha20poly1305_detached() argument 73 if (crypto_box_curve25519xchacha20poly1305_beforenm(k, pk, sk) != 0) { in crypto_box_curve25519xchacha20poly1305_detached() 74 return -1; in crypto_box_curve25519xchacha20poly1305_detached() [all …]
|
/freebsd/crypto/openssl/include/crypto/ |
H A D | asn1.h | 2 * Copyright 2015-2021 The OpenSSL Project Authors. All Rights Reserved. 29 int (*pub_decode) (EVP_PKEY *pk, const X509_PUBKEY *pub); 30 int (*pub_encode) (X509_PUBKEY *pub, const EVP_PKEY *pk); 34 int (*priv_decode) (EVP_PKEY *pk, const PKCS8_PRIV_KEY_INFO *p8inf); 35 int (*priv_encode) (PKCS8_PRIV_KEY_INFO *p8, const EVP_PKEY *pk); 38 int (*pkey_size) (const EVP_PKEY *pk); 39 int (*pkey_bits) (const EVP_PKEY *pk); 40 int (*pkey_security_bits) (const EVP_PKEY *pk); 44 int (*param_missing) (const EVP_PKEY *pk); 68 int (*pkey_check) (const EVP_PKEY *pk); [all …]
|
/freebsd/crypto/openssl/doc/internal/man3/ |
H A D | evp_keymgmt_util_export_to_provider.pod | 13 - internal KEYMGMT utility functions 21 int evp_keymgmt_util_export(const EVP_PKEY *pk, int selection, 23 void *evp_keymgmt_util_export_to_provider(EVP_PKEY *pk, EVP_KEYMGMT *keymgmt, 25 OP_CACHE_ELEM *evp_keymgmt_util_find_operation_cache(EVP_PKEY *pk, 28 int evp_keymgmt_util_clear_operation_cache(EVP_PKEY *pk, int locking); 29 int evp_keymgmt_util_cache_keydata(EVP_PKEY *pk, EVP_KEYMGMT *keymgmt, 31 void evp_keymgmt_util_cache_keyinfo(EVP_PKEY *pk); 38 I<keymgmt> and I<keydata> from I<pk>. This is used as a 42 (provider side key material) from the given key I<pk> to a provider 44 It maintains a cache of provider key references in I<pk> to keep track [all …]
|
/freebsd/contrib/libfido2/fuzz/ |
H A D | fuzz_assert.c | 2 * Copyright (c) 2019-2023 Yubico AB. All rights reserved. 3 * Use of this source code is governed by a BSD-style 5 * SPDX-License-Identifier: BSD-2-Clause 19 #include "../openbsd-compat/openbsd-compat.h" 71 int ok = -1; in unpack() 82 if (unpack_byte(v[0], &p->u in unpack() 256 verify_assert(int type,const unsigned char * cdh_ptr,size_t cdh_len,const char * rp_id,const unsigned char * authdata_ptr,size_t authdata_len,const unsigned char * sig_ptr,size_t sig_len,uint8_t up,uint8_t uv,int ext,void * pk) verify_assert() argument 303 es256_pk_t *pk = NULL; es256_convert() local 324 es384_pk_t *pk = NULL; es384_convert() local 345 rs256_pk_t *pk = NULL; rs256_convert() local 366 eddsa_pk_t *pk = NULL; eddsa_convert() local 393 void *pk; test() local [all...] |
/freebsd/contrib/libfido2/examples/ |
H A D | util.c | 2 * Copyright (c) 2018-2022 Yubico AB. All rights reserved. 3 * Use of this source code is governed by a BSD-style 5 * SPDX-License-Identifier: BSD-2-Clause 30 #include "../openbsd-compat/posix_win.h" 32 #include "../openbsd-compat/openbsd-compat.h" 42 return (-1); in base10() 44 return (-1); in base10() 46 return (-1); in base10() 54 int fd, ok = -1; in write_blob() 73 if (fd != -1) { in write_blob() [all …]
|
/freebsd/sys/contrib/libsodium/src/libsodium/crypto_box/curve25519xsalsa20poly1305/ |
H A D | box_curve25519xsalsa20poly1305.c | 12 crypto_box_curve25519xsalsa20poly1305_seed_keypair(unsigned char *pk, in crypto_box_curve25519xsalsa20poly1305_seed_keypair() argument 22 return crypto_scalarmult_curve25519_base(pk, sk); in crypto_box_curve25519xsalsa20poly1305_seed_keypair() 26 crypto_box_curve25519xsalsa20poly1305_keypair(unsigned char *pk, in crypto_box_curve25519xsalsa20poly1305_keypair() argument 31 return crypto_scalarmult_curve25519_base(pk, sk); in crypto_box_curve25519xsalsa20poly1305_keypair() 36 const unsigned char *pk, in crypto_box_curve25519xsalsa20poly1305_beforenm() argument 42 if (crypto_scalarmult_curve25519(s, sk, pk) != 0) { in crypto_box_curve25519xsalsa20poly1305_beforenm() 43 return -1; in crypto_box_curve25519xsalsa20poly1305_beforenm() 72 const unsigned char *pk, in crypto_box_curve25519xsalsa20poly1305() argument 78 if (crypto_box_curve25519xsalsa20poly1305_beforenm(k, pk, sk) != 0) { in crypto_box_curve25519xsalsa20poly1305() 79 return -1; in crypto_box_curve25519xsalsa20poly1305() [all …]
|
/freebsd/sys/contrib/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ |
H A D | open.c | 17 const unsigned char *pk, in _crypto_sign_ed25519_verify_detached() argument 28 return -1; in _crypto_sign_ed25519_verify_detached() 33 return -1; in _crypto_sign_ed25519_verify_detached() 35 if (ge25519_is_canonical(pk) == 0 || in _crypto_sign_ed25519_verify_detached() 36 ge25519_has_small_order(pk) != 0) { in _crypto_sign_ed25519_verify_detached() 37 return -1; in _crypto_sign_ed25519_verify_detached() 40 if (ge25519_frombytes_negate_vartime(&A, pk) != 0) { in _crypto_sign_ed25519_verify_detached() 41 return -1; in _crypto_sign_ed25519_verify_detached() 45 crypto_hash_sha512_update(&hs, pk, 32); in _crypto_sign_ed25519_verify_detached() 53 return crypto_verify_32(rcheck, sig) | (-(rcheck == sig)) | in _crypto_sign_ed25519_verify_detached() [all …]
|
/freebsd/sys/contrib/libsodium/src/libsodium/include/sodium/ |
H A D | crypto_box.h | 5 * THREAD SAFETY: crypto_box_keypair() is thread-safe, 8 * Other functions are always thread-safe. 18 # pragma GCC diagnostic ignored "-Wlong-long" 52 int crypto_box_seed_keypair(unsigned char *pk, unsigned char *sk, 56 int crypto_box_keypair(unsigned char *pk, unsigned char *sk); 61 const unsigned char *pk, const unsigned char *sk) 67 const unsigned char *pk, const unsigned char *sk) 73 const unsigned char *n, const unsigned char *pk, 82 const unsigned char *pk, 86 /* -- Precomputation interface -- */ [all …]
|
H A D | crypto_box_curve25519xchacha20poly1305.h | 11 # pragma GCC diagnostic ignored "-Wlong-long" 41 (crypto_stream_xchacha20_MESSAGEBYTES_MAX - crypto_box_curve25519xchacha20poly1305_MACBYTES) 46 int crypto_box_curve25519xchacha20poly1305_seed_keypair(unsigned char *pk, 51 int crypto_box_curve25519xchacha20poly1305_keypair(unsigned char *pk, 59 const unsigned char *pk, 68 const unsigned char *pk, 78 const unsigned char *pk, 88 const unsigned char *pk, 92 /* -- Precomputation interface -- */ 96 const unsigned char *pk, [all …]
|
/freebsd/contrib/bearssl/src/x509/ |
H A D | encode_ec_rawder.c | 53 const br_ec_private_key *sk, const br_ec_public_key *pk, in br_encode_ec_raw_der_inner() argument 70 * The value of the 'privateKey' field is the raw unsigned big-endian in br_encode_ec_raw_der_inner() 77 * by the unsigned big-endian encodings of the X and Y coordinates, in br_encode_ec_raw_der_inner() 86 oid = br_get_curve_OID(sk->curve); in br_encode_ec_raw_der_inner() 94 len_privateKey = 1 + len_of_len(sk->xlen) + sk->xlen; in br_encode_ec_raw_der_inner() 100 if (pk == NULL) { in br_encode_ec_raw_der_inner() 104 len_publicKey_bits = 2 + len_of_len(pk->qlen) + pk->qlen; in br_encode_ec_raw_der_inner() 127 buf += br_asn1_encode_length(buf, sk->xlen); in br_encode_ec_raw_der_inner() 128 memcpy(buf, sk->x, sk->xlen); in br_encode_ec_raw_der_inner() 129 buf += sk->xlen; in br_encode_ec_raw_der_inner() [all …]
|
/freebsd/contrib/libfido2/man/ |
H A D | rs256_pk_new.3 | 1 .\" Copyright (c) 2018-2022 Yubico AB. All rights reserved. 26 .\" SPDX-License-Identifier: BSD-2-Clause 47 .Fn rs256_pk_from_EVP_PKEY "rs256_pk_t *pk" "const EVP_PKEY *pkey" 49 .Fn rs256_pk_from_RSA "rs256_pk_t *pk" "const RSA *rsa" 51 .Fn rs256_pk_from_ptr "rs256_pk_t *pk" "const void *ptr" "size_t len" 53 .Fn rs256_pk_to_EVP_PKEY "const rs256_pk_t *pk" 56 (COSE) RFC to PKCS#1.5 2048-bit RSA with SHA-256. 100 .Fa pk 110 .Fa pk 120 .Fa pk [all …]
|