/titanic_44/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softDH.c | 88 soft_dh_genkey_pair(soft_object_t *pubkey, soft_object_t *prikey) in soft_dh_genkey_pair() argument 101 if ((pubkey->class != CKO_PUBLIC_KEY) || in soft_dh_genkey_pair() 102 (pubkey->key_type != CKK_DH)) { in soft_dh_genkey_pair() 137 rv = soft_get_public_value(pubkey, CKA_PRIME, prime, &prime_len); in soft_dh_genkey_pair() 142 rv = soft_get_public_value(pubkey, CKA_BASE, base, &base_len); in soft_dh_genkey_pair() 153 k.rfunc = (IS_TOKEN_OBJECT(pubkey) || IS_TOKEN_OBJECT(prikey)) ? in soft_dh_genkey_pair() 169 if ((rv = soft_genDHkey_set_attribute(pubkey, CKA_VALUE, public_y, in soft_dh_genkey_pair()
|
H A D | softDSA.c | 464 soft_dsa_genkey_pair(soft_object_t *pubkey, soft_object_t *prikey) in soft_dsa_genkey_pair() argument 479 if ((pubkey == NULL) || (prikey == NULL)) { in soft_dsa_genkey_pair() 484 rv = soft_get_public_value(pubkey, CKA_PRIME, prime, &prime_len); in soft_dsa_genkey_pair() 490 rv = soft_get_public_value(pubkey, CKA_SUBPRIME, subprime, in soft_dsa_genkey_pair() 497 rv = soft_get_public_value(pubkey, CKA_BASE, base, &base_len); in soft_dsa_genkey_pair() 510 k.rfunc = (IS_TOKEN_OBJECT(pubkey) || IS_TOKEN_OBJECT(prikey)) ? in soft_dsa_genkey_pair() 526 if ((rv = soft_genDSAkey_set_attribute(pubkey, CKA_VALUE, in soft_dsa_genkey_pair()
|
H A D | softEC.c | 147 soft_ec_genkey_pair(soft_object_t *pubkey, soft_object_t *prikey) in soft_ec_genkey_pair() argument 158 if ((pubkey->class != CKO_PUBLIC_KEY) || in soft_ec_genkey_pair() 159 (pubkey->key_type != CKK_EC)) in soft_ec_genkey_pair() 169 rv = soft_get_public_key_attribute(pubkey, &template); in soft_ec_genkey_pair() 204 soft_genECkey_set_attribute(pubkey, &bi, CKA_EC_POINT); in soft_ec_genkey_pair()
|
H A D | softRSA.c | 822 soft_rsa_genkey_pair(soft_object_t *pubkey, soft_object_t *prikey) in soft_rsa_genkey_pair() argument 844 if ((pubkey == NULL) || (prikey == NULL)) { in soft_rsa_genkey_pair() 854 rv = get_ulong_attr_from_object(OBJ_PUB_RSA_MOD_BITS(pubkey), in soft_rsa_genkey_pair() 870 rv = soft_get_public_value(pubkey, CKA_PUBLIC_EXPONENT, pub_expo, in soft_rsa_genkey_pair() 882 k.rfunc = (IS_TOKEN_OBJECT(pubkey) || IS_TOKEN_OBJECT(prikey)) ? in soft_rsa_genkey_pair() 909 if ((rv = soft_genRSAkey_set_attribute(pubkey, CKA_MODULUS, in soft_rsa_genkey_pair()
|
/titanic_44/usr/src/lib/libresolv2/common/dst/ |
H A D | dst_api.c | 328 DST_KEY *dg_key = NULL, *pubkey = NULL; in dst_read_key() local 347 if ((pubkey = dst_s_read_public_key(keyname, in_id, in_alg)) == NULL) in dst_read_key() 351 return pubkey; in dst_read_key() 353 if (!(dg_key = dst_s_get_key_struct(keyname, pubkey->dk_alg, in dst_read_key() 354 pubkey->dk_flags, pubkey->dk_proto, in dst_read_key() 358 if (dst_s_read_private_key_file(keyname, dg_key, pubkey->dk_id, in dst_read_key() 359 pubkey->dk_alg) == 0) in dst_read_key() 362 (void)dst_free_key(pubkey); in dst_read_key()
|
/titanic_44/usr/src/lib/libkmf/plugins/kmf_openssl/common/ |
H A D | openssl_spi.c | 1378 RSA *pubkey = EVP_PKEY_get1_RSA(key->keyp); in OpenSSL_EncodePubKeyData() local 1380 if (!(n = i2d_RSA_PUBKEY(pubkey, &keydata->Data))) { in OpenSSL_EncodePubKeyData() 1384 RSA_free(pubkey); in OpenSSL_EncodePubKeyData() 1386 DSA *pubkey = EVP_PKEY_get1_DSA(key->keyp); in OpenSSL_EncodePubKeyData() local 1388 if (!(n = i2d_DSA_PUBKEY(pubkey, &keydata->Data))) { in OpenSSL_EncodePubKeyData() 1392 DSA_free(pubkey); in OpenSSL_EncodePubKeyData() 1487 KMF_KEY_HANDLE *pubkey = NULL, *privkey = NULL; in OpenSSL_CreateKeypair() local 1506 pubkey = kmf_get_attr_ptr(KMF_PUBKEY_HANDLE_ATTR, attrlist, numattr); in OpenSSL_CreateKeypair() 1507 if (pubkey == NULL) in OpenSSL_CreateKeypair() 1514 (void) memset(pubkey, 0, sizeof (KMF_KEY_HANDLE)); in OpenSSL_CreateKeypair() [all …]
|
/titanic_44/usr/src/lib/libkmf/plugins/kmf_nss/common/ |
H A D | nss_spi.c | 825 KMF_KEY_HANDLE *pubkey = NULL; in NSS_CreateKeypair() local 863 pubkey = kmf_get_attr_ptr(KMF_PUBKEY_HANDLE_ATTR, attrlist, numattr); in NSS_CreateKeypair() 865 if (pubkey == NULL || privkey == NULL) in NSS_CreateKeypair() 868 (void) memset(pubkey, 0, sizeof (KMF_KEY_HANDLE)); in NSS_CreateKeypair() 979 pubkey->kstype = KMF_KEYSTORE_NSS; in NSS_CreateKeypair() 980 pubkey->keyalg = keytype; in NSS_CreateKeypair() 981 pubkey->keyp = (void *)NSSpubkey; in NSS_CreateKeypair() 982 pubkey->keyclass = KMF_ASYM_PUB; in NSS_CreateKeypair() 983 pubkey->keylabel = PK11_GetPublicKeyNickname(NSSpubkey); in NSS_CreateKeypair() 995 pubkey->keyp = NULL; in NSS_CreateKeypair() [all …]
|
/titanic_44/usr/src/lib/libkmf/plugins/kmf_pkcs11/common/ |
H A D | pkcs11_spi.c | 1659 KMF_KEY_HANDLE *pubkey, *privkey; in KMFPK11_CreateKeypair() local 1696 pubkey = kmf_get_attr_ptr(KMF_PUBKEY_HANDLE_ATTR, attlist, numattr); in KMFPK11_CreateKeypair() 1697 if (pubkey == NULL) in KMFPK11_CreateKeypair() 1704 (void) memset(pubkey, 0, sizeof (KMF_KEY_HANDLE)); in KMFPK11_CreateKeypair() 1734 pubkey->kstype = KMF_KEYSTORE_PK11TOKEN; in KMFPK11_CreateKeypair() 1735 pubkey->keyalg = KMF_RSA; in KMFPK11_CreateKeypair() 1736 pubkey->keyclass = KMF_ASYM_PUB; in KMFPK11_CreateKeypair() 1737 pubkey->keyp = (void *)pubKey; in KMFPK11_CreateKeypair() 1780 pubkey->kstype = KMF_KEYSTORE_PK11TOKEN; in KMFPK11_CreateKeypair() 1781 pubkey->keyalg = KMF_DSA; in KMFPK11_CreateKeypair() [all …]
|
/titanic_44/usr/src/cmd/ssh/sshd/ |
H A D | Makefile | 43 auth2-pubkey.o \
|
/titanic_44/usr/src/lib/libsldap/common/ |
H A D | ns_sldap.h | 437 char *pubkey; member
|
H A D | ns_writes.c | 2953 if (ptr->name == NULL || ptr->pubkey == '\0' || ptr->privkey == '\0') { in __s_cvt_publickey() 2973 rc = __s_add_attr(e, "nisPublickey", ptr->pubkey); in __s_cvt_publickey()
|
/titanic_44/usr/src/uts/common/io/fibre-channel/fca/emlxs/ |
H A D | emlxs_dhchap.c | 5930 void *pubkey, in emlxs_BIGNUM_pubkey() argument 6023 bignum2bytestring(pubkey, &result, in emlxs_BIGNUM_pubkey() 6070 uint8_t pubkey[512]; in emlxs_hash_Cai() local 6089 err = emlxs_BIGNUM_pubkey(port, pubkey, dhval, dhvallen, in emlxs_hash_Cai() 6108 bcopy((void *)pubkey, in emlxs_hash_Cai() 6113 bcopy((void *)pubkey, in emlxs_hash_Cai() 6119 bcopy((void *)pubkey, in emlxs_hash_Cai() 6125 MD5Update(&mdctx, (unsigned char *)pubkey, pubkey_len); in emlxs_hash_Cai() 6135 err = emlxs_BIGNUM_pubkey(port, pubkey, dhval, dhvallen, in emlxs_hash_Cai() 6154 bcopy((void *)pubkey, in emlxs_hash_Cai() [all …]
|
/titanic_44/usr/src/cmd/keyserv/ |
H A D | setkey.c | 1641 pk_get_conv_key(uid, pubkey, result) in pk_get_conv_key() argument 1643 keybuf pubkey; 1664 memcpy(xpublic, pubkey, sizeof (keybuf));
|
/titanic_44/usr/src/lib/libkmf/libkmf/common/ |
H A D | certop.c | 1081 KMF_X509_SPKI *pubkey; in kmf_encrypt() local 1132 pubkey = &x509cert->certificate.subjectPublicKeyInfo; in kmf_encrypt() 1135 alg = &pubkey->algorithm.algorithm; in kmf_encrypt() 1156 ret = PKCS_EncryptData(handle, algid, pubkey, plaintext, ciphertext); in kmf_encrypt()
|
/titanic_44/usr/src/cmd/ssh/ |
H A D | README.altprivsep | 337 - evaluation of ~/.ssh/authorized_keys (for pubkey userauth) 340 - verification of signatures w/ public keys (pubkey, hostbased) 672 pubkey and hostbased user authentication):
|
/titanic_44/usr/src/cmd/ldap/ns_ldap/ |
H A D | ldapaddent.c | 2386 data.pubkey = tmppubkey; in genent_publickey() 2417 free(data.pubkey); in genent_publickey()
|
/titanic_44/usr/src/cmd/ssh/doc/ |
H A D | ChangeLog | 882 make userauth+pubkey interop with ssh.com-2.2.0 938 implement bug compatibility with ssh-2.0.13 pubkey, server side 1307 - add DSA pubkey auth and other SSH2 fixes. use ssh-keygen -[xX]
|