Searched refs:skey (Results 1 - 22 of 22) sorted by relevance

/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt/cipher/
H A Delgamal.c57 ELG_secret_key *skey);
59 ELG_secret_key *skey);
487 decrypt(gcry_mpi_t output, gcry_mpi_t a, gcry_mpi_t b, ELG_secret_key *skey )
489 gcry_mpi_t t1 = mpi_alloc_secure( mpi_get_nlimbs( skey->p ) );
492 gcry_mpi_powm( t1, a, skey->x, skey->p );
493 mpi_invm( t1, t1, skey->p );
494 mpi_mulm( output, b, t1, skey->p );
498 log_mpidump("elg decrypted x= ", skey->x);
499 log_mpidump("elg decrypted p= ", skey
616 elg_generate_ext(int algo, unsigned int nbits, unsigned long evalue, const gcry_sexp_t genparms, gcry_mpi_t *skey, gcry_mpi_t **retfactors, gcry_sexp_t *r_extrainfo) argument
661 elg_generate(int algo, unsigned int nbits, unsigned long evalue, gcry_mpi_t *skey, gcry_mpi_t **retfactors) argument
680 elg_check_secret_key(int algo, gcry_mpi_t *skey) argument
730 elg_decrypt(int algo, gcry_mpi_t *result, gcry_mpi_t *data, gcry_mpi_t *skey, int flags) argument
756 elg_sign(int algo, gcry_mpi_t *resarr, gcry_mpi_t data, gcry_mpi_t *skey) argument
[all...]
H A Drsa.c90 static void public (gcry_mpi_t output, gcry_mpi_t input, RSA_public_key *skey);
91 static void secret (gcry_mpi_t output, gcry_mpi_t input, RSA_secret_key *skey);
616 stronger_key_check ( RSA_secret_key *skey )
624 mpi_mul( t, skey->p, skey->q);
625 if (mpi_cmp( t, skey->n) )
629 if( mpi_cmp( skey->p, skey->q ) > 0 )
632 _gcry_mpi_swap ( skey->p, skey
776 rsa_generate_ext(int algo, unsigned int nbits, unsigned long evalue, const gcry_sexp_t genparms, gcry_mpi_t *skey, gcry_mpi_t **retfactors, gcry_sexp_t *r_extrainfo) argument
853 rsa_generate(int algo, unsigned int nbits, unsigned long evalue, gcry_mpi_t *skey, gcry_mpi_t **retfactors) argument
861 rsa_check_secret_key(int algo, gcry_mpi_t *skey) argument
904 rsa_decrypt(int algo, gcry_mpi_t *result, gcry_mpi_t *data, gcry_mpi_t *skey, int flags) argument
986 rsa_sign(int algo, gcry_mpi_t *resarr, gcry_mpi_t data, gcry_mpi_t *skey) argument
1091 selftest_sign_1024(gcry_sexp_t pkey, gcry_sexp_t skey) argument
1179 selftest_encr_1024(gcry_sexp_t pkey, gcry_sexp_t skey) argument
1281 gcry_sexp_t skey = NULL; local
[all...]
H A Decc.c300 static gpg_err_code_t sign (gcry_mpi_t input, ECC_secret_key *skey,
580 * To verify correct skey it use a random information.
699 sign (gcry_mpi_t input, ECC_secret_key *skey, gcry_mpi_t r, gcry_mpi_t s)
716 ctx = _gcry_mpi_ec_init (skey->E.p, skey->E.a);
727 k = gen_k (skey->E.n, GCRY_STRONG_RANDOM);
728 _gcry_mpi_ec_mul_point (&I, k, &skey->E.G, ctx);
736 mpi_mod (r, x, skey->E.n); /* r = x mod n */
738 mpi_mulm (dr, skey->d, r, skey
695 sign(gcry_mpi_t input, ECC_secret_key *skey, gcry_mpi_t r, gcry_mpi_t s) argument
955 ecc_generate_ext(int algo, unsigned int nbits, unsigned long evalue, const gcry_sexp_t genparms, gcry_mpi_t *skey, gcry_mpi_t **retfactors, gcry_sexp_t *r_extrainfo) argument
1019 ecc_generate(int algo, unsigned int nbits, unsigned long evalue, gcry_mpi_t *skey, gcry_mpi_t **retfactors) argument
1061 ecc_check_secret_key(int algo, gcry_mpi_t *skey) argument
1107 ecc_sign(int algo, gcry_mpi_t *resarr, gcry_mpi_t data, gcry_mpi_t *skey) argument
[all...]
H A Ddsa.c108 DSA_secret_key *skey);
598 sign(gcry_mpi_t r, gcry_mpi_t s, gcry_mpi_t hash, DSA_secret_key *skey )
605 k = gen_k( skey->q );
608 gcry_mpi_powm( r, skey->g, k, skey->p );
609 mpi_fdiv_r( r, r, skey->q );
613 mpi_invm(kinv, k, skey->q );
616 tmp = mpi_alloc( mpi_get_nlimbs(skey->p) );
617 mpi_mul( tmp, skey->x, r );
619 mpi_mulm( s , kinv, tmp, skey
679 dsa_generate_ext(int algo, unsigned int nbits, unsigned long evalue, const gcry_sexp_t genparms, gcry_mpi_t *skey, gcry_mpi_t **retfactors, gcry_sexp_t *r_extrainfo) argument
928 dsa_generate(int algo, unsigned int nbits, unsigned long evalue, gcry_mpi_t *skey, gcry_mpi_t **retfactors) argument
938 dsa_check_secret_key(int algo, gcry_mpi_t *skey) argument
963 dsa_sign(int algo, gcry_mpi_t *resarr, gcry_mpi_t data, gcry_mpi_t *skey) argument
1030 selftest_sign_1024(gcry_sexp_t pkey, gcry_sexp_t skey) argument
1090 gcry_sexp_t skey = NULL; local
[all...]
H A Dpubkey.c34 gcry_mpi_t *data, gcry_mpi_t *skey,
37 gcry_mpi_t hash, gcry_mpi_t *skey);
111 gcry_mpi_t *skey, gcry_mpi_t **retfactors)
116 (void)skey;
123 dummy_check_secret_key (int algorithm, gcry_mpi_t *skey) argument
126 (void)skey;
146 gcry_mpi_t *skey, int flags)
151 (void)skey;
159 gcry_mpi_t *skey)
164 (void)skey;
110 dummy_generate(int algorithm, unsigned int nbits, unsigned long dummy, gcry_mpi_t *skey, gcry_mpi_t **retfactors) argument
145 dummy_decrypt(int algorithm, gcry_mpi_t *result, gcry_mpi_t *data, gcry_mpi_t *skey, int flags) argument
158 dummy_sign(int algorithm, gcry_mpi_t *resarr, gcry_mpi_t data, gcry_mpi_t *skey) argument
541 pubkey_generate(int algorithm, unsigned int nbits, unsigned long use_e, gcry_sexp_t genparms, gcry_mpi_t *skey, gcry_mpi_t **retfactors, gcry_sexp_t *r_extrainfo) argument
580 pubkey_check_secret_key(int algorithm, gcry_mpi_t *skey) argument
658 pubkey_decrypt(int algorithm, gcry_mpi_t *result, gcry_mpi_t *data, gcry_mpi_t *skey, int flags) argument
705 pubkey_sign(int algorithm, gcry_mpi_t *resarr, gcry_mpi_t data, gcry_mpi_t *skey) argument
1736 gcry_mpi_t *skey = NULL, *data = NULL, plain = NULL; local
1831 gcry_mpi_t *skey = NULL, hash = NULL, *result = NULL; local
2080 gcry_mpi_t skey[12]; local
[all...]
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt-grub/cipher/
H A Delgamal.c57 ELG_secret_key *skey);
59 ELG_secret_key *skey);
487 decrypt(gcry_mpi_t output, gcry_mpi_t a, gcry_mpi_t b, ELG_secret_key *skey )
489 gcry_mpi_t t1 = mpi_alloc_secure( mpi_get_nlimbs( skey->p ) );
492 gcry_mpi_powm( t1, a, skey->x, skey->p );
493 mpi_invm( t1, t1, skey->p );
494 mpi_mulm( output, b, t1, skey->p );
498 log_mpidump("elg decrypted x= ", skey->x);
499 log_mpidump("elg decrypted p= ", skey
616 elg_generate_ext(int algo, unsigned int nbits, unsigned long evalue, const gcry_sexp_t genparms, gcry_mpi_t *skey, gcry_mpi_t **retfactors, gcry_sexp_t *r_extrainfo) argument
661 elg_generate(int algo, unsigned int nbits, unsigned long evalue, gcry_mpi_t *skey, gcry_mpi_t **retfactors) argument
680 elg_check_secret_key(int algo, gcry_mpi_t *skey) argument
730 elg_decrypt(int algo, gcry_mpi_t *result, gcry_mpi_t *data, gcry_mpi_t *skey, int flags) argument
756 elg_sign(int algo, gcry_mpi_t *resarr, gcry_mpi_t data, gcry_mpi_t *skey) argument
[all...]
H A Drsa.c89 static void public (gcry_mpi_t output, gcry_mpi_t input, RSA_public_key *skey);
90 static void secret (gcry_mpi_t output, gcry_mpi_t input, RSA_secret_key *skey);
615 stronger_key_check ( RSA_secret_key *skey )
623 mpi_mul( t, skey->p, skey->q);
624 if (mpi_cmp( t, skey->n) )
628 if( mpi_cmp( skey->p, skey->q ) > 0 )
631 _gcry_mpi_swap ( skey->p, skey
775 rsa_generate_ext(int algo, unsigned int nbits, unsigned long evalue, const gcry_sexp_t genparms, gcry_mpi_t *skey, gcry_mpi_t **retfactors, gcry_sexp_t *r_extrainfo) argument
852 rsa_generate(int algo, unsigned int nbits, unsigned long evalue, gcry_mpi_t *skey, gcry_mpi_t **retfactors) argument
860 rsa_check_secret_key(int algo, gcry_mpi_t *skey) argument
903 rsa_decrypt(int algo, gcry_mpi_t *result, gcry_mpi_t *data, gcry_mpi_t *skey, int flags) argument
985 rsa_sign(int algo, gcry_mpi_t *resarr, gcry_mpi_t data, gcry_mpi_t *skey) argument
[all...]
H A Decc.c300 static gpg_err_code_t sign (gcry_mpi_t input, ECC_secret_key *skey,
580 * To verify correct skey it use a random information.
699 sign (gcry_mpi_t input, ECC_secret_key *skey, gcry_mpi_t r, gcry_mpi_t s)
716 ctx = _gcry_mpi_ec_init (skey->E.p, skey->E.a);
727 k = gen_k (skey->E.n, GCRY_STRONG_RANDOM);
728 _gcry_mpi_ec_mul_point (&I, k, &skey->E.G, ctx);
736 mpi_mod (r, x, skey->E.n); /* r = x mod n */
738 mpi_mulm (dr, skey->d, r, skey
695 sign(gcry_mpi_t input, ECC_secret_key *skey, gcry_mpi_t r, gcry_mpi_t s) argument
955 ecc_generate_ext(int algo, unsigned int nbits, unsigned long evalue, const gcry_sexp_t genparms, gcry_mpi_t *skey, gcry_mpi_t **retfactors, gcry_sexp_t *r_extrainfo) argument
1019 ecc_generate(int algo, unsigned int nbits, unsigned long evalue, gcry_mpi_t *skey, gcry_mpi_t **retfactors) argument
1061 ecc_check_secret_key(int algo, gcry_mpi_t *skey) argument
1107 ecc_sign(int algo, gcry_mpi_t *resarr, gcry_mpi_t data, gcry_mpi_t *skey) argument
[all...]
H A Ddsa.c108 DSA_secret_key *skey);
598 sign(gcry_mpi_t r, gcry_mpi_t s, gcry_mpi_t hash, DSA_secret_key *skey )
605 k = gen_k( skey->q );
608 gcry_mpi_powm( r, skey->g, k, skey->p );
609 mpi_fdiv_r( r, r, skey->q );
613 mpi_invm(kinv, k, skey->q );
616 tmp = mpi_alloc( mpi_get_nlimbs(skey->p) );
617 mpi_mul( tmp, skey->x, r );
619 mpi_mulm( s , kinv, tmp, skey
679 dsa_generate_ext(int algo, unsigned int nbits, unsigned long evalue, const gcry_sexp_t genparms, gcry_mpi_t *skey, gcry_mpi_t **retfactors, gcry_sexp_t *r_extrainfo) argument
928 dsa_generate(int algo, unsigned int nbits, unsigned long evalue, gcry_mpi_t *skey, gcry_mpi_t **retfactors) argument
938 dsa_check_secret_key(int algo, gcry_mpi_t *skey) argument
963 dsa_sign(int algo, gcry_mpi_t *resarr, gcry_mpi_t data, gcry_mpi_t *skey) argument
[all...]
/osnet-11/usr/src/lib/gss_mechs/mech_dh/dh_common/
H A Ddh_common.h48 __generic_common_dhkeys(char *pkey, char *skey, int keylen,
H A Dgeneric_key.c241 char *skey, /* Our private key */
249 MINT *sk = mp_xtom(skey);
240 __generic_common_dhkeys(char *pkey, char *skey, int keylen, char *xmodulus, des_block keys[], int keynum ) argument
/osnet-11/usr/src/lib/libnsl/key/
H A Dpublickey.c145 getkeys_nis(int *errp, char *netname, char *pkey, char *skey, char *passwd) argument
203 if (skey && extract_secret(p, skey, passwd))
225 getkeys_files(int *errp, char *netname, char *pkey, char *skey, char *passwd) argument
286 if (skey && extract_secret(p, skey, passwd))
326 getsecretkey(const char *netname, char *skey, const char *passwd) argument
328 return (getsecretkey_g(netname, KEYSIZE, 0, skey, HEXKEYBYTES+1,
424 char *skey, /* out */
484 if (skey
419 getkeys_ldap_g( int *err, char *netname, char *pkey, int pkeylen, char *skey, int skeylen, char *passwd, keylen_t keylen, algtype_t algtype) argument
624 getsecretkey_g( const char *netname, keylen_t keylen, algtype_t algtype, char *skey, size_t skeylen, const char *passwd) argument
[all...]
H A Dgen_dhkeys.c169 char *skey, /* out */
176 if (! pkey || ! skey || ! pass)
180 __gen_dhkeys(pkey, skey, pass);
188 (*dlfp)(pkey, skey, pass); /* void */
168 __gen_dhkeys_g(char *pkey, char *skey, keylen_t keylen, algtype_t algtype, char *pass) argument
/osnet-11/usr/src/lib/fm/libdiskstatus/common/
H A Dds_scsi.c337 uint_t skey, asc, ascq; local
362 &headers, &skey, &asc, &ascq)) == 0) {
387 } else if (SCSI_INVALID_OPCODE(skey, asc, ascq)) {
394 &headers, &skey, &asc, &ascq);
463 "ASC=0x%x ASCQ=0x%x)\n", skey, asc, ascq);
778 uint_t skey, asc, ascq; local
788 MODEPAGE_INFO_EXCPT_LEN, &sip->si_hdrs, &skey, &asc,
793 MODEPAGE_INFO_EXCPT_LEN, &junk_hdrs, &skey, &asc, &ascq);
798 "ASC=0x%x ASCQ=0x%x)", skey, asc, ascq);
846 uint_t skey, as local
926 uint_t skey, asc, ascq; local
981 uint_t skey, asc, ascq; local
1172 uint_t skey, asc, ascq; local
[all...]
/osnet-11/usr/src/lib/nsswitch/ldap/common/
H A Dgetkeyent.c73 char *buffer, *pkey, *skey; local
123 skey = *skey_array + keytypelen;
126 len = strlen(pkey) + strlen(skey) + 2;
137 (void) snprintf(buffer, len, "%s:%s", pkey, skey);
/osnet-11/usr/src/lib/libnisdb/yptol/
H A Ddit_access_utils.c1019 char *skey, *str, *sipkey; local
1040 if ((skey = am(myself, key->dsize + 1)) == 0) {
1044 (void) memcpy(skey, key->dptr, key->dsize);
1059 if (verifyIndexMatch(t, 0, 0, N2LKEY, skey) == 0 ||
1060 verifyIndexMatch(t, 0, 0, N2LIPKEY, skey) == 0)
1077 myself, *statP, skey, t->dbId, map);
1093 myself, skey, t->dbId, map,
1120 myself, nr, skey, t->dbId, map,
1136 *statP, skey,
1145 if ((rc = verifyKey(skey,
1221 char *dn = 0, *skey, *svalue, *str; local
[all...]
/osnet-11/usr/src/lib/pam_modules/dhkeys/
H A Dkey_call_uid.c159 key_setnet_g_uid(const char *netname, const char *skey, keylen_t skeylen, argument
174 arg.st_priv_key.keybuf3_val = (char *)skey;
201 (void) memcpy(&tmp.st_priv_key, skey,
208 (void) memcpy(&tmp.st_pub_key, skey,
H A Ddhkeys.c109 char *skey; local
115 if ((skey = malloc(skeylen)) == NULL) {
119 if (getsecretkey_g(netname, keylen, algtype, skey, skeylen, pw)) {
122 if (skey[0]) {
125 if (key_setnet_g_uid(netname, skey, keylen, NULL, 0,
154 free(skey);
/osnet-11/usr/src/lib/libslp/javalib/com/sun/slp/
H A DParser.java265 Object skey = en.nextElement();
267 target.put(skey, source.get(skey));
/osnet-11/usr/src/lib/libnsl/rpc/
H A Dkey_call.c611 * both, of skey or pkey may have zero length. If both lengths are
615 * Stores the specified netname/pkey/skey triplet in the keyserv.
623 const char *skey,
640 arg.st_priv_key.keybuf3_val = (char *)skey;
664 (void) memcpy(&tmp.st_priv_key, skey,
671 (void) memcpy(&tmp.st_pub_key, skey,
697 key_setnet_g(const char *netname, const char *skey, keylen_t skeylen, argument
700 return (key_setnet_g_ext(netname, skey, skeylen, pkey, pkeylen,
708 key_setnet_g_ruid(const char *netname, const char *skey, keylen_t skeylen, argument
711 return (key_setnet_g_ext(netname, skey, skeyle
621 key_setnet_g_ext( const char *netname, const char *skey, keylen_t skeylen, const char *pkey, keylen_t pkeylen, algtype_t algtype, int use_ruid) argument
[all...]
/osnet-11/usr/src/lib/libkmf/plugins/kmf_openssl/common/
H A Dopenssl_spi.c2548 EVP_PKEY *skey = NULL; local
2605 skey = X509_get_pubkey(signer);
2606 if (skey == NULL) {
2611 ret = OCSP_BASICRESP_verify(bs, skey, 0);
2626 if (skey != NULL) {
2627 EVP_PKEY_free(skey);
/osnet-11/usr/src/lib/libnsl/common/
H A Dllib-lnsl135 int getsecretkey(const char *netname, char *skey, const char *passwd);

Completed in 87 milliseconds