Home
last modified time | relevance | path

Searched refs:pubkey (Results 1 – 17 of 17) sorted by relevance

/titanic_44/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftDH.c88 soft_dh_genkey_pair(soft_object_t *pubkey, soft_object_t *prikey) in soft_dh_genkey_pair() argument
101 if ((pubkey->class != CKO_PUBLIC_KEY) || in soft_dh_genkey_pair()
102 (pubkey->key_type != CKK_DH)) { in soft_dh_genkey_pair()
137 rv = soft_get_public_value(pubkey, CKA_PRIME, prime, &prime_len); in soft_dh_genkey_pair()
142 rv = soft_get_public_value(pubkey, CKA_BASE, base, &base_len); in soft_dh_genkey_pair()
153 k.rfunc = (IS_TOKEN_OBJECT(pubkey) || IS_TOKEN_OBJECT(prikey)) ? in soft_dh_genkey_pair()
169 if ((rv = soft_genDHkey_set_attribute(pubkey, CKA_VALUE, public_y, in soft_dh_genkey_pair()
H A DsoftDSA.c464 soft_dsa_genkey_pair(soft_object_t *pubkey, soft_object_t *prikey) in soft_dsa_genkey_pair() argument
479 if ((pubkey == NULL) || (prikey == NULL)) { in soft_dsa_genkey_pair()
484 rv = soft_get_public_value(pubkey, CKA_PRIME, prime, &prime_len); in soft_dsa_genkey_pair()
490 rv = soft_get_public_value(pubkey, CKA_SUBPRIME, subprime, in soft_dsa_genkey_pair()
497 rv = soft_get_public_value(pubkey, CKA_BASE, base, &base_len); in soft_dsa_genkey_pair()
510 k.rfunc = (IS_TOKEN_OBJECT(pubkey) || IS_TOKEN_OBJECT(prikey)) ? in soft_dsa_genkey_pair()
526 if ((rv = soft_genDSAkey_set_attribute(pubkey, CKA_VALUE, in soft_dsa_genkey_pair()
H A DsoftEC.c147 soft_ec_genkey_pair(soft_object_t *pubkey, soft_object_t *prikey) in soft_ec_genkey_pair() argument
158 if ((pubkey->class != CKO_PUBLIC_KEY) || in soft_ec_genkey_pair()
159 (pubkey->key_type != CKK_EC)) in soft_ec_genkey_pair()
169 rv = soft_get_public_key_attribute(pubkey, &template); in soft_ec_genkey_pair()
204 soft_genECkey_set_attribute(pubkey, &bi, CKA_EC_POINT); in soft_ec_genkey_pair()
H A DsoftRSA.c822 soft_rsa_genkey_pair(soft_object_t *pubkey, soft_object_t *prikey) in soft_rsa_genkey_pair() argument
844 if ((pubkey == NULL) || (prikey == NULL)) { in soft_rsa_genkey_pair()
854 rv = get_ulong_attr_from_object(OBJ_PUB_RSA_MOD_BITS(pubkey), in soft_rsa_genkey_pair()
870 rv = soft_get_public_value(pubkey, CKA_PUBLIC_EXPONENT, pub_expo, in soft_rsa_genkey_pair()
882 k.rfunc = (IS_TOKEN_OBJECT(pubkey) || IS_TOKEN_OBJECT(prikey)) ? in soft_rsa_genkey_pair()
909 if ((rv = soft_genRSAkey_set_attribute(pubkey, CKA_MODULUS, in soft_rsa_genkey_pair()
/titanic_44/usr/src/lib/libresolv2/common/dst/
H A Ddst_api.c328 DST_KEY *dg_key = NULL, *pubkey = NULL; in dst_read_key() local
347 if ((pubkey = dst_s_read_public_key(keyname, in_id, in_alg)) == NULL) in dst_read_key()
351 return pubkey; in dst_read_key()
353 if (!(dg_key = dst_s_get_key_struct(keyname, pubkey->dk_alg, in dst_read_key()
354 pubkey->dk_flags, pubkey->dk_proto, in dst_read_key()
358 if (dst_s_read_private_key_file(keyname, dg_key, pubkey->dk_id, in dst_read_key()
359 pubkey->dk_alg) == 0) in dst_read_key()
362 (void)dst_free_key(pubkey); in dst_read_key()
/titanic_44/usr/src/lib/libkmf/plugins/kmf_openssl/common/
H A Dopenssl_spi.c1378 RSA *pubkey = EVP_PKEY_get1_RSA(key->keyp); in OpenSSL_EncodePubKeyData() local
1380 if (!(n = i2d_RSA_PUBKEY(pubkey, &keydata->Data))) { in OpenSSL_EncodePubKeyData()
1384 RSA_free(pubkey); in OpenSSL_EncodePubKeyData()
1386 DSA *pubkey = EVP_PKEY_get1_DSA(key->keyp); in OpenSSL_EncodePubKeyData() local
1388 if (!(n = i2d_DSA_PUBKEY(pubkey, &keydata->Data))) { in OpenSSL_EncodePubKeyData()
1392 DSA_free(pubkey); in OpenSSL_EncodePubKeyData()
1487 KMF_KEY_HANDLE *pubkey = NULL, *privkey = NULL; in OpenSSL_CreateKeypair() local
1506 pubkey = kmf_get_attr_ptr(KMF_PUBKEY_HANDLE_ATTR, attrlist, numattr); in OpenSSL_CreateKeypair()
1507 if (pubkey == NULL) in OpenSSL_CreateKeypair()
1514 (void) memset(pubkey, 0, sizeof (KMF_KEY_HANDLE)); in OpenSSL_CreateKeypair()
[all …]
/titanic_44/usr/src/lib/libkmf/plugins/kmf_nss/common/
H A Dnss_spi.c825 KMF_KEY_HANDLE *pubkey = NULL; in NSS_CreateKeypair() local
863 pubkey = kmf_get_attr_ptr(KMF_PUBKEY_HANDLE_ATTR, attrlist, numattr); in NSS_CreateKeypair()
865 if (pubkey == NULL || privkey == NULL) in NSS_CreateKeypair()
868 (void) memset(pubkey, 0, sizeof (KMF_KEY_HANDLE)); in NSS_CreateKeypair()
979 pubkey->kstype = KMF_KEYSTORE_NSS; in NSS_CreateKeypair()
980 pubkey->keyalg = keytype; in NSS_CreateKeypair()
981 pubkey->keyp = (void *)NSSpubkey; in NSS_CreateKeypair()
982 pubkey->keyclass = KMF_ASYM_PUB; in NSS_CreateKeypair()
983 pubkey->keylabel = PK11_GetPublicKeyNickname(NSSpubkey); in NSS_CreateKeypair()
995 pubkey->keyp = NULL; in NSS_CreateKeypair()
[all …]
/titanic_44/usr/src/lib/libkmf/plugins/kmf_pkcs11/common/
H A Dpkcs11_spi.c1659 KMF_KEY_HANDLE *pubkey, *privkey; in KMFPK11_CreateKeypair() local
1696 pubkey = kmf_get_attr_ptr(KMF_PUBKEY_HANDLE_ATTR, attlist, numattr); in KMFPK11_CreateKeypair()
1697 if (pubkey == NULL) in KMFPK11_CreateKeypair()
1704 (void) memset(pubkey, 0, sizeof (KMF_KEY_HANDLE)); in KMFPK11_CreateKeypair()
1734 pubkey->kstype = KMF_KEYSTORE_PK11TOKEN; in KMFPK11_CreateKeypair()
1735 pubkey->keyalg = KMF_RSA; in KMFPK11_CreateKeypair()
1736 pubkey->keyclass = KMF_ASYM_PUB; in KMFPK11_CreateKeypair()
1737 pubkey->keyp = (void *)pubKey; in KMFPK11_CreateKeypair()
1780 pubkey->kstype = KMF_KEYSTORE_PK11TOKEN; in KMFPK11_CreateKeypair()
1781 pubkey->keyalg = KMF_DSA; in KMFPK11_CreateKeypair()
[all …]
/titanic_44/usr/src/cmd/ssh/sshd/
H A DMakefile43 auth2-pubkey.o \
/titanic_44/usr/src/lib/libsldap/common/
H A Dns_sldap.h437 char *pubkey; member
H A Dns_writes.c2953 if (ptr->name == NULL || ptr->pubkey == '\0' || ptr->privkey == '\0') { in __s_cvt_publickey()
2973 rc = __s_add_attr(e, "nisPublickey", ptr->pubkey); in __s_cvt_publickey()
/titanic_44/usr/src/uts/common/io/fibre-channel/fca/emlxs/
H A Demlxs_dhchap.c5930 void *pubkey, in emlxs_BIGNUM_pubkey() argument
6023 bignum2bytestring(pubkey, &result, in emlxs_BIGNUM_pubkey()
6070 uint8_t pubkey[512]; in emlxs_hash_Cai() local
6089 err = emlxs_BIGNUM_pubkey(port, pubkey, dhval, dhvallen, in emlxs_hash_Cai()
6108 bcopy((void *)pubkey, in emlxs_hash_Cai()
6113 bcopy((void *)pubkey, in emlxs_hash_Cai()
6119 bcopy((void *)pubkey, in emlxs_hash_Cai()
6125 MD5Update(&mdctx, (unsigned char *)pubkey, pubkey_len); in emlxs_hash_Cai()
6135 err = emlxs_BIGNUM_pubkey(port, pubkey, dhval, dhvallen, in emlxs_hash_Cai()
6154 bcopy((void *)pubkey, in emlxs_hash_Cai()
[all …]
/titanic_44/usr/src/cmd/keyserv/
H A Dsetkey.c1641 pk_get_conv_key(uid, pubkey, result) in pk_get_conv_key() argument
1643 keybuf pubkey;
1664 memcpy(xpublic, pubkey, sizeof (keybuf));
/titanic_44/usr/src/lib/libkmf/libkmf/common/
H A Dcertop.c1081 KMF_X509_SPKI *pubkey; in kmf_encrypt() local
1132 pubkey = &x509cert->certificate.subjectPublicKeyInfo; in kmf_encrypt()
1135 alg = &pubkey->algorithm.algorithm; in kmf_encrypt()
1156 ret = PKCS_EncryptData(handle, algid, pubkey, plaintext, ciphertext); in kmf_encrypt()
/titanic_44/usr/src/cmd/ssh/
H A DREADME.altprivsep337 - evaluation of ~/.ssh/authorized_keys (for pubkey userauth)
340 - verification of signatures w/ public keys (pubkey, hostbased)
672 pubkey and hostbased user authentication):
/titanic_44/usr/src/cmd/ldap/ns_ldap/
H A Dldapaddent.c2386 data.pubkey = tmppubkey; in genent_publickey()
2417 free(data.pubkey); in genent_publickey()
/titanic_44/usr/src/cmd/ssh/doc/
H A DChangeLog882 make userauth+pubkey interop with ssh.com-2.2.0
938 implement bug compatibility with ssh-2.0.13 pubkey, server side
1307 - add DSA pubkey auth and other SSH2 fixes. use ssh-keygen -[xX]