Searched refs:pubkey (Results 1 - 25 of 57) sorted by relevance

123

/freebsd-13-stable/contrib/wpa/src/crypto/
H A Dcrypto_internal-modexp.c17 u8 *pubkey)
30 pubkey, &pubkey_len) < 0)
34 os_memmove(pubkey + pad, pubkey, pubkey_len);
35 os_memset(pubkey, 0, pad);
45 const u8 *pubkey, size_t pubkey_len,
53 os_memcmp(pubkey, prime, prime_len) >= 0))
57 if (!pub || bignum_set_unsigned_bin(pub, pubkey, pubkey_len) < 0 ||
65 /* verify: pubkey^q == 1 mod p */
81 res = crypto_mod_exp(pubkey, pubkey_le
16 crypto_dh_init(u8 generator, const u8 *prime, size_t prime_len, u8 *privkey, u8 *pubkey) argument
42 crypto_dh_derive_secret(u8 generator, const u8 *prime, size_t prime_len, const u8 *order, size_t order_len, const u8 *privkey, size_t privkey_len, const u8 *pubkey, size_t pubkey_len, u8 *secret, size_t *len) argument
[all...]
H A Dcrypto_nettle.c308 u8 *pubkey)
321 pubkey, &pubkey_len) < 0)
325 os_memmove(pubkey + pad, pubkey, pubkey_len);
326 os_memset(pubkey, 0, pad);
336 const u8 *pubkey, size_t pubkey_len,
344 os_memcmp(pubkey, prime, prime_len) >= 0))
348 mpz_import(pub, pubkey_len, 1, 1, 1, 0, pubkey);
356 /* verify: pubkey^q == 1 mod p */
367 res = crypto_mod_exp(pubkey, pubkey_le
307 crypto_dh_init(u8 generator, const u8 *prime, size_t prime_len, u8 *privkey, u8 *pubkey) argument
333 crypto_dh_derive_secret(u8 generator, const u8 *prime, size_t prime_len, const u8 *order, size_t order_len, const u8 *privkey, size_t privkey_len, const u8 *pubkey, size_t pubkey_len, u8 *secret, size_t *len) argument
[all...]
H A Dcrypto_gnutls.c287 u8 *pubkey)
300 pubkey, &pubkey_len) < 0)
304 os_memmove(pubkey + pad, pubkey, pubkey_len);
305 os_memset(pubkey, 0, pad);
315 const u8 *pubkey, size_t pubkey_len,
323 os_memcmp(pubkey, prime, prime_len) >= 0))
326 if (gcry_mpi_scan(&pub, GCRYMPI_FMT_USG, pubkey, pubkey_len, NULL) !=
335 /* verify: pubkey^q == 1 mod p */
353 res = crypto_mod_exp(pubkey, pubkey_le
286 crypto_dh_init(u8 generator, const u8 *prime, size_t prime_len, u8 *privkey, u8 *pubkey) argument
312 crypto_dh_derive_secret(u8 generator, const u8 *prime, size_t prime_len, const u8 *order, size_t order_len, const u8 *privkey, size_t privkey_len, const u8 *pubkey, size_t pubkey_len, u8 *secret, size_t *len) argument
[all...]
H A Dcrypto_wolfssl.c646 struct wpabuf *pubkey = NULL; local
664 pubkey = wpabuf_alloc(RFC3526_LEN);
665 if (!privkey || !pubkey)
674 wpabuf_mhead(pubkey), &pub_sz) != 0)
678 wpabuf_put(pubkey, pub_sz);
682 *publ = pubkey;
685 pubkey = NULL;
687 wpabuf_clear_free(pubkey);
779 u8 *pubkey)
802 if (wc_DhGenerateKeyPair(dh, &rng, privkey, &priv_sz, pubkey,
778 crypto_dh_init(u8 generator, const u8 *prime, size_t prime_len, u8 *privkey, u8 *pubkey) argument
828 crypto_dh_derive_secret(u8 generator, const u8 *prime, size_t prime_len, const u8 *order, size_t order_len, const u8 *privkey, size_t privkey_len, const u8 *pubkey, size_t pubkey_len, u8 *secret, size_t *len) argument
1738 struct wpabuf *pubkey = NULL; local
[all...]
/freebsd-13-stable/crypto/openssl/crypto/ec/curve448/
H A Ded448.h37 * pubkey (out): The public key.
41 uint8_t pubkey [EDDSA_448_PUBLIC_BYTES],
49 * pubkey (in): The public key.
64 const uint8_t pubkey[EDDSA_448_PUBLIC_BYTES],
74 * pubkey (in): The public key.
88 const uint8_t pubkey[EDDSA_448_PUBLIC_BYTES],
99 * pubkey (in): The public key.
114 pubkey[EDDSA_448_PUBLIC_BYTES],
125 * pubkey (in): The public key.
138 const uint8_t pubkey[EDDSA_448_PUBLIC_BYTE
[all...]
H A Deddsa.c89 uint8_t pubkey[EDDSA_448_PUBLIC_BYTES],
120 curve448_point_mul_by_ratio_and_encode_like_eddsa(pubkey, p);
133 const uint8_t pubkey[EDDSA_448_PUBLIC_BYTES],
207 || !EVP_DigestUpdate(hashctx, pubkey, EDDSA_448_PUBLIC_BYTES)
238 const uint8_t pubkey[EDDSA_448_PUBLIC_BYTES],
242 return c448_ed448_sign(signature, privkey, pubkey, hash, 64, 1, context,
248 const uint8_t pubkey[EDDSA_448_PUBLIC_BYTES],
283 curve448_point_decode_like_eddsa_and_mul_by_ratio(pk_point, pubkey);
302 || !EVP_DigestUpdate(hashctx, pubkey, EDDSA_448_PUBLIC_BYTES)
330 const uint8_t pubkey[EDDSA_448_PUBLIC_BYTE
88 c448_ed448_derive_public_key( uint8_t pubkey[EDDSA_448_PUBLIC_BYTES], const uint8_t privkey[EDDSA_448_PRIVATE_BYTES]) argument
130 c448_ed448_sign( uint8_t signature[EDDSA_448_SIGNATURE_BYTES], const uint8_t privkey[EDDSA_448_PRIVATE_BYTES], const uint8_t pubkey[EDDSA_448_PUBLIC_BYTES], const uint8_t *message, size_t message_len, uint8_t prehashed, const uint8_t *context, size_t context_len) argument
235 c448_ed448_sign_prehash( uint8_t signature[EDDSA_448_SIGNATURE_BYTES], const uint8_t privkey[EDDSA_448_PRIVATE_BYTES], const uint8_t pubkey[EDDSA_448_PUBLIC_BYTES], const uint8_t hash[64], const uint8_t *context, size_t context_len) argument
246 c448_ed448_verify( const uint8_t signature[EDDSA_448_SIGNATURE_BYTES], const uint8_t pubkey[EDDSA_448_PUBLIC_BYTES], const uint8_t *message, size_t message_len, uint8_t prehashed, const uint8_t *context, uint8_t context_len) argument
328 c448_ed448_verify_prehash( const uint8_t signature[EDDSA_448_SIGNATURE_BYTES], const uint8_t pubkey[EDDSA_448_PUBLIC_BYTES], const uint8_t hash[64], const uint8_t *context, uint8_t context_len) argument
[all...]
/freebsd-13-stable/crypto/openssl/crypto/x509v3/
H A Dv3_skey.c59 X509_PUBKEY *pubkey; local
82 pubkey = ctx->subject_req->req_info.pubkey;
84 pubkey = ctx->subject_cert->cert_info.key;
86 if (pubkey == NULL) {
91 X509_PUBKEY_get0_param(NULL, &pk, &pklen, NULL, pubkey);
/freebsd-13-stable/crypto/openssl/crypto/x509/
H A Dx509_r2x.c25 EVP_PKEY *pubkey = NULL; local
56 pubkey = X509_REQ_get0_pubkey(r);
57 if (pubkey == NULL || !X509_set_pubkey(ret, pubkey))
H A Dx509spki.c18 return X509_PUBKEY_set(&(x->spkac->pubkey), pkey);
25 return X509_PUBKEY_get(x->spkac->pubkey);
H A Dx509rset.c39 return X509_PUBKEY_set(&x->req_info.pubkey, pkey);
H A Dx_req.c51 ASN1_SIMPLE(X509_REQ_INFO, pubkey, X509_PUBKEY),
H A Dx_pubkey.c33 X509_PUBKEY *pubkey = (X509_PUBKEY *)*pval; local
34 EVP_PKEY_free(pubkey->pkey);
36 /* Attempt to decode public key and cache in pubkey structure. */
37 X509_PUBKEY *pubkey = (X509_PUBKEY *)*pval; local
38 EVP_PKEY_free(pubkey->pkey);
39 pubkey->pkey = NULL;
46 if (x509_pubkey_decode(&pubkey->pkey, pubkey) == -1)
/freebsd-13-stable/crypto/openssl/crypto/asn1/
H A Dx_spki.c16 ASN1_SIMPLE(NETSCAPE_SPKAC, pubkey, X509_PUBKEY),
H A Dt_spki.c28 X509_PUBKEY_get0_param(&spkioid, NULL, NULL, NULL, spki->spkac->pubkey);
32 pkey = X509_PUBKEY_get(spki->spkac->pubkey);
/freebsd-13-stable/crypto/openssl/crypto/ec/
H A Decx_meth.c50 unsigned char *privkey, *pubkey; local
75 pubkey = key->pubkey;
78 memcpy(pubkey, p, plen);
104 X25519_public_from_private(pubkey, privkey);
107 ED25519_public_from_private(pubkey, privkey);
110 X448_public_from_private(pubkey, privkey);
113 ED448_public_from_private(pubkey, privkey);
135 penc = OPENSSL_memdup(ecxkey->pubkey, KEYLEN(pkey));
150 static int ecx_pub_decode(EVP_PKEY *pkey, X509_PUBKEY *pubkey) argument
657 validate_ecx_derive(EVP_PKEY_CTX *ctx, unsigned char *key, size_t *keylen, const unsigned char **privkey, const unsigned char **pubkey) argument
687 const unsigned char *privkey, *pubkey; local
700 const unsigned char *privkey, *pubkey; local
[all...]
H A Dec_ameth.c153 static int eckey_pub_decode(EVP_PKEY *pkey, X509_PUBKEY *pubkey) argument
161 if (!X509_PUBKEY_get0_param(NULL, &p, &pklen, &palg, pubkey))
652 X509_ALGOR *alg, ASN1_BIT_STRING *pubkey)
684 plen = ASN1_STRING_length(pubkey);
685 p = ASN1_STRING_get0_data(pubkey);
804 ASN1_BIT_STRING *pubkey; local
805 if (!CMS_RecipientInfo_kari_get0_orig_id(ri, &alg, &pubkey,
808 if (!alg || !pubkey)
810 if (!ecdh_cms_set_peerkey(pctx, alg, pubkey)) {
831 ASN1_BIT_STRING *pubkey; local
651 ecdh_cms_set_peerkey(EVP_PKEY_CTX *pctx, X509_ALGOR *alg, ASN1_BIT_STRING *pubkey) argument
[all...]
/freebsd-13-stable/contrib/wpa/src/wps/
H A Dwps_attr_build.c23 struct wpabuf *pubkey = NULL; local
39 pubkey = wpabuf_dup(wps->wps->dh_pubkey);
62 pubkey = wpabuf_dup(wps->wps->ap_nfc_dh_pubkey);
63 if (wps->dh_privkey && pubkey)
64 wps->dh_ctx = dh5_init_fixed(wps->dh_privkey, pubkey);
69 wps->dh_ctx = dh5_init(&wps->dh_privkey, &pubkey);
70 pubkey = wpabuf_zeropad(pubkey, 192);
72 if (wps->dh_ctx == NULL || wps->dh_privkey == NULL || pubkey == NULL) {
75 wpabuf_free(pubkey);
414 wps_build_oob_dev_pw(struct wpabuf *msg, u16 dev_pw_id, const struct wpabuf *pubkey, const u8 *dev_pw, size_t dev_pw_len) argument
[all...]
H A Dwps_common.c64 struct wpabuf *pubkey, *dh_shared; local
75 pubkey = wps->registrar ? wps->dh_pubkey_e : wps->dh_pubkey_r;
76 if (pubkey == NULL) {
82 wpa_hexdump_buf(MSG_DEBUG, "WPS: DH peer Public Key", pubkey);
83 dh_shared = dh5_derive_shared(wps->dh_ctx, pubkey, wps->dh_privkey);
413 const struct wpabuf *pubkey,
422 if (wps_build_oob_dev_pw(data, dev_pw_id, pubkey,
624 struct wpabuf * wps_nfc_token_build(int ndef, int id, struct wpabuf *pubkey, argument
629 if (pubkey == NULL || dev_pw == NULL)
632 ret = wps_build_nfc_pw_token(id, pubkey, dev_p
412 wps_build_nfc_pw_token(u16 dev_pw_id, const struct wpabuf *pubkey, const struct wpabuf *dev_pw) argument
646 wps_nfc_gen_dh(struct wpabuf **pubkey, struct wpabuf **privkey) argument
672 wps_nfc_token_gen(int ndef, int *id, struct wpabuf **pubkey, struct wpabuf **privkey, struct wpabuf **dev_pw) argument
[all...]
/freebsd-13-stable/contrib/unbound/validator/
H A Dval_secalgo.c1115 nss_setup_key_digest(int algo, SECKEYPublicKey** pubkey, HASH_HashType* htype, argument
1144 *pubkey = nss_buf2dsa(key, keylen);
1145 if(!*pubkey) {
1163 *pubkey = nss_buf2rsa(key, keylen);
1164 if(!*pubkey) {
1200 *pubkey = nss_buf2rsa(key, keylen);
1201 if(!*pubkey) {
1212 *pubkey = nss_buf2ecdsa(key, keylen,
1214 if(!*pubkey) {
1222 *pubkey
1264 SECKEYPublicKey* pubkey = NULL; local
1563 struct dsa_public_key pubkey; local
1650 struct rsa_public_key pubkey; local
1729 struct ecc_point pubkey; local
[all...]
/freebsd-13-stable/sbin/dumpon/
H A Ddumpon.c90 "usage: dumpon [-i index] [-r] [-v] [-k <pubkey>] [-Zz] <device>\n"
91 " dumpon [-i index] [-r] [-v] [-k <pubkey>] [-Zz]\n"
216 RSA *pubkey; local
222 pubkey = NULL;
243 pubkey = RSA_new();
244 if (pubkey == NULL) {
249 pubkey = PEM_read_RSA_PUBKEY(fp, &pubkey, NULL, NULL);
252 if (pubkey == NULL)
271 if (RSA_security_bits(pubkey) < 11
[all...]
/freebsd-13-stable/crypto/openssl/crypto/ct/
H A Dct_sct_ctx.c238 int SCT_CTX_set1_issuer_pubkey(SCT_CTX *sctx, X509_PUBKEY *pubkey) argument
240 return ct_public_key_hash(pubkey, &sctx->ihash, &sctx->ihashlen);
243 int SCT_CTX_set1_pubkey(SCT_CTX *sctx, X509_PUBKEY *pubkey) argument
245 EVP_PKEY *pkey = X509_PUBKEY_get(pubkey);
250 if (!ct_public_key_hash(pubkey, &sctx->pkeyhash, &sctx->pkeyhashlen)) {
H A Dct_local.h149 __owur int SCT_CTX_set1_issuer_pubkey(SCT_CTX *sctx, X509_PUBKEY *pubkey);
155 __owur int SCT_CTX_set1_pubkey(SCT_CTX *sctx, X509_PUBKEY *pubkey);
/freebsd-13-stable/crypto/openssl/apps/
H A Dspkac.c40 {"pubkey", OPT_PUBKEY, '-', "Output public key"},
61 int i, ret = 1, verify = 0, noout = 0, pubkey = 0; local
87 pubkey = 1;
189 if (pubkey)
/freebsd-13-stable/contrib/ldns/
H A Dkeys.c1823 ldns_rr *pubkey; local
1841 pubkey = ldns_rr_new();
1850 ldns_rr_set_type(pubkey, LDNS_RR_TYPE_KEY);
1853 ldns_rr_set_type(pubkey, LDNS_RR_TYPE_DNSKEY);
1857 ldns_rr_push_rdf(pubkey,
1861 ldns_rr_push_rdf(pubkey,
1865 ldns_rr_set_owner(pubkey, ldns_rdf_clone(ldns_key_pubkey_owner(k)));
1875 ldns_rr_push_rdf(pubkey,
1882 ldns_rr_free(pubkey);
1887 ldns_rr_free(pubkey);
[all...]
/freebsd-13-stable/crypto/openssl/crypto/dh/
H A Ddh_ameth.c45 static int dh_pub_decode(EVP_PKEY *pkey, X509_PUBKEY *pubkey) argument
57 if (!X509_PUBKEY_get0_param(NULL, &p, &pklen, &palg, pubkey))
147 * explicitly included and the pubkey must be recalculated.
612 X509_ALGOR *alg, ASN1_BIT_STRING *pubkey)
639 plen = ASN1_STRING_length(pubkey);
640 p = ASN1_STRING_get0_data(pubkey);
755 ASN1_BIT_STRING *pubkey; local
756 if (!CMS_RecipientInfo_kari_get0_orig_id(ri, &alg, &pubkey,
759 if (!alg || !pubkey)
761 if (!dh_cms_set_peerkey(pctx, alg, pubkey)) {
611 dh_cms_set_peerkey(EVP_PKEY_CTX *pctx, X509_ALGOR *alg, ASN1_BIT_STRING *pubkey) argument
782 ASN1_BIT_STRING *pubkey; local
[all...]

Completed in 253 milliseconds

123