Searched refs:pub (Results 1 - 19 of 19) sorted by relevance

/bind-9.11.3/lib/dns/
H A Dpkcs11dh_link.c152 pkcs11dh_computesecret(const dst_key_t *pub, const dst_key_t *priv, argument
182 REQUIRE(pub->keydata.pkey != NULL);
185 attr = pk11_attribute_bytype(pub->keydata.pkey, CKA_PRIME);
190 attr = pk11_attribute_bytype(pub->keydata.pkey, CKA_VALUE);
201 mech.pParameter = isc_mem_get(pub->mctx, mech.ulParameterLen);
219 attr->pValue = isc_mem_get(pub->mctx, attr->ulValueLen);
245 isc_mem_put(pub->mctx,
253 isc_mem_put(pub->mctx, mech.pParameter, mech.ulParameterLen);
377 CK_OBJECT_HANDLE pub = CK_INVALID_HANDLE; local
488 &pub,
668 CK_BYTE *prime = NULL, *base = NULL, *pub = NULL; local
744 CK_BYTE *prime = NULL, *base = NULL, *pub = NULL; local
924 CK_ATTRIBUTE *prime = NULL, *base = NULL, *pub = NULL, *prv = NULL; local
1007 pkcs11dh_parse(dst_key_t *key, isc_lex_t *lexer, dst_key_t *pub) argument
[all...]
H A Dpkcs11eddsa_link.c64 const char *label, dst_key_t *pub);
446 CK_OBJECT_HANDLE pub = CK_INVALID_HANDLE; local
512 &pub, &priv),
523 (pk11_ctx->session, pub, attr, 1),
530 (pk11_ctx->session, pub, attr, 1),
547 (void) pkcs_C_DestroyObject(pk11_ctx->session, pub);
563 if (pub != CK_INVALID_HANDLE)
564 (void) pkcs_C_DestroyObject(pk11_ctx->session, pub);
784 dst_key_t *pub)
808 pubec = pub
783 pkcs11eddsa_fetch(dst_key_t *key, const char *engine, const char *label, dst_key_t *pub) argument
896 pkcs11eddsa_parse(dst_key_t *key, isc_lex_t *lexer, dst_key_t *pub) argument
[all...]
H A Dpkcs11gost_link.c473 CK_OBJECT_HANDLE pub = CK_INVALID_HANDLE; local
520 &pub, &priv),
542 (pk11_ctx->session, pub, attr, 1),
549 (pk11_ctx->session, pub, attr, 1),
567 (void) pkcs_C_DestroyObject(pk11_ctx->session, pub);
578 if (pub != CK_INVALID_HANDLE)
579 (void) pkcs_C_DestroyObject(pk11_ctx->session, pub);
819 pkcs11gost_parse(dst_key_t *key, isc_lex_t *lexer, dst_key_t *pub) { argument
826 if ((pub == NULL) || (pub
[all...]
H A Dopensslecdsa_link.c508 ecdsa_check(EC_KEY *eckey, dst_key_t *pub) argument
515 if (pub == NULL)
517 pkey = pub->keydata.pkey;
538 opensslecdsa_parse(dst_key_t *key, isc_lex_t *lexer, dst_key_t *pub) { argument
558 if (pub == NULL)
560 key->keydata.pkey = pub->keydata.pkey;
561 pub->keydata.pkey = NULL;
582 if (ecdsa_check(eckey, pub) != ISC_R_SUCCESS)
H A Dopenssleddsa_link.c563 eddsa_check(EVP_PKEY *privkey, dst_key_t *pub) argument
567 if (pub == NULL)
569 pkey = pub->keydata.pkey;
578 openssleddsa_parse(dst_key_t *key, isc_lex_t *lexer, dst_key_t *pub) { argument
596 if (pub == NULL)
598 key->keydata.pkey = pub->keydata.pkey;
599 pub->keydata.pkey = NULL;
618 if (eddsa_check(pkey, pub) != ISC_R_SUCCESS) {
H A Dopensslgost_link.c450 opensslgost_parse(dst_key_t *key, isc_lex_t *lexer, dst_key_t *pub) { argument
468 if (pub == NULL)
470 key->keydata.pkey = pub->keydata.pkey;
471 pub->keydata.pkey = NULL;
472 key->key_size = pub->key_size;
489 if ((pub != NULL) && (pub->keydata.pkey != NULL)) {
490 eckey = EVP_PKEY_get0(pub->keydata.pkey);
H A Dpkcs11ecdsa_link.c66 const char *label, dst_key_t *pub);
454 CK_OBJECT_HANDLE pub = CK_INVALID_HANDLE; local
520 &pub, &priv),
531 (pk11_ctx->session, pub, attr, 1),
538 (pk11_ctx->session, pub, attr, 1),
554 (void) pkcs_C_DestroyObject(pk11_ctx->session, pub);
570 if (pub != CK_INVALID_HANDLE)
571 (void) pkcs_C_DestroyObject(pk11_ctx->session, pub);
798 dst_key_t *pub)
822 pubec = pub
797 pkcs11ecdsa_fetch(dst_key_t *key, const char *engine, const char *label, dst_key_t *pub) argument
910 pkcs11ecdsa_parse(dst_key_t *key, isc_lex_t *lexer, dst_key_t *pub) argument
[all...]
H A Dpkcs11dsa_link.c515 CK_OBJECT_HANDLE pub = CK_INVALID_HANDLE; local
606 &pub, &priv),
612 (pk11_ctx->session, pub, attr, 1),
619 (pk11_ctx->session, pub, attr, 1),
637 (void) pkcs_C_DestroyObject(pk11_ctx->session, pub);
649 if (pub != CK_INVALID_HANDLE)
650 (void) pkcs_C_DestroyObject(pk11_ctx->session, pub);
978 pkcs11dsa_parse(dst_key_t *key, isc_lex_t *lexer, dst_key_t *pub) { argument
994 if (pub == NULL)
997 key->keydata.pkey = pub
[all...]
H A Dopensslrsa_link.c1419 rsa_check(RSA *rsa, RSA *pub) { argument
1429 if (pub != NULL) {
1430 RSA_get0_key(pub, &n2, &e2, NULL);
1457 opensslrsa_parse(dst_key_t *key, isc_lex_t *lexer, dst_key_t *pub) { argument
1483 if (pub == NULL)
1485 key->keydata.pkey = pub->keydata.pkey;
1486 pub->keydata.pkey = NULL;
1487 key->key_size = pub->key_size;
1494 if (pub != NULL && pub
[all...]
H A Ddst_internal.h201 isc_result_t (*computesecret)(const dst_key_t *pub,
218 dst_key_t *pub);
H A Dhmac_link.c273 hmacmd5_parse(dst_key_t *key, isc_lex_t *lexer, dst_key_t *pub) { argument
280 UNUSED(pub);
581 hmacsha1_parse(dst_key_t *key, isc_lex_t *lexer, dst_key_t *pub) { argument
588 UNUSED(pub);
874 hmacsha224_parse(dst_key_t *key, isc_lex_t *lexer, dst_key_t *pub) { argument
881 UNUSED(pub);
1161 hmacsha256_parse(dst_key_t *key, isc_lex_t *lexer, dst_key_t *pub) { argument
1168 UNUSED(pub);
1448 hmacsha384_parse(dst_key_t *key, isc_lex_t *lexer, dst_key_t *pub) { argument
1455 UNUSED(pub);
1735 hmacsha512_parse(dst_key_t *key, isc_lex_t *lexer, dst_key_t *pub) argument
[all...]
H A Dpkcs11rsa_link.c46 const char *label, dst_key_t *pub);
1168 CK_OBJECT_HANDLE pub = CK_INVALID_HANDLE; local
1260 &pub, &priv),
1285 (pk11_ctx->session, pub, attr, 2),
1294 (pk11_ctx->session, pub, attr, 2),
1312 (void) pkcs_C_DestroyObject(pk11_ctx->session, pub);
1323 if (pub != CK_INVALID_HANDLE)
1324 (void) pkcs_C_DestroyObject(pk11_ctx->session, pub);
1698 dst_key_t *pub)
1722 pubrsa = pub
1697 pkcs11rsa_fetch(dst_key_t *key, const char *engine, const char *label, dst_key_t *pub) argument
1879 pkcs11rsa_parse(dst_key_t *key, isc_lex_t *lexer, dst_key_t *pub) argument
[all...]
H A Dopenssldh_link.c135 openssldh_computesecret(const dst_key_t *pub, const dst_key_t *priv, argument
144 REQUIRE(pub->keydata.dh != NULL);
147 dhpub = pub->keydata.dh;
623 openssldh_parse(dst_key_t *key, isc_lex_t *lexer, dst_key_t *pub) { argument
632 UNUSED(pub);
H A Dopenssldsa_link.c691 openssldsa_parse(dst_key_t *key, isc_lex_t *lexer, dst_key_t *pub) { argument
709 if (pub == NULL)
711 key->keydata.pkey = pub->keydata.pkey;
712 pub->keydata.pkey = NULL;
713 key->key_size = pub->key_size;
H A Ddst_api.c470 dst_key_computesecret(const dst_key_t *pub, const dst_key_t *priv, argument
474 REQUIRE(VALID_KEY(pub) && VALID_KEY(priv));
477 CHECKALG(pub->key_alg);
480 if (pub->keydata.generic == NULL || priv->keydata.generic == NULL)
483 if (pub->key_alg != priv->key_alg ||
484 pub->func->computesecret == NULL ||
491 return (pub->func->computesecret(pub, priv, secret));
/bind-9.11.3/bin/tests/system/metadata/
H A Dtests.sh186 pub=`$SETTIME -upP $key | awk '{print $2}'`
188 [ $pub -eq $act ] || ret=1
190 pub=`$SETTIME -upP $key | awk '{print $2}'`
192 [ $pub -lt $act ] || ret=1
194 pub=`$SETTIME -upP $key | awk '{print $2}'`
195 [ $pub = "UNSET" ] || ret=1
/bind-9.11.3/bin/dnssec/
H A Ddnssec-settime.c151 isc_stdtime_t pub = 0, act = 0, rev = 0, inact = 0, del = 0; local
292 pub = strtotime(isc_commandline_argument,
435 pub = previnact - prepub;
465 if (setpub && setact && (act - prepub) < pub)
472 act = pub + prepub;
475 pub = act - prepub;
545 dst_key_settime(key, DST_TIME_PUBLISH, pub);
H A Ddnssec-importkey.c61 static isc_stdtime_t pub = 0, del = 0; variable
231 dst_key_settime(key, DST_TIME_PUBLISH, pub);
368 pub = strtotime(isc_commandline_argument,
/bind-9.11.3/lib/dns/include/dst/
H A Ddst.h280 dst_key_computesecret(const dst_key_t *pub, const dst_key_t *priv,
286 * \li "pub" is a valid key that can be used to derive a shared secret

Completed in 70 milliseconds