/freebsd-current/crypto/openssl/crypto/ec/curve448/ |
H A D | curve448_local.h | 15 const uint8_t public_key[57], const uint8_t private_key[57], 20 const uint8_t signature[114], const uint8_t public_key[57],
|
H A D | eddsa.c | 377 size_t message_len, const uint8_t public_key[57], 381 return ossl_c448_ed448_sign(ctx, out_sig, private_key, public_key, message, 388 const uint8_t signature[114], const uint8_t public_key[57], 391 return ossl_c448_ed448_verify(ctx, signature, public_key, message, 398 const uint8_t public_key[57], const uint8_t private_key[57], 401 return ossl_c448_ed448_sign_prehash(ctx, out_sig, private_key, public_key, 408 const uint8_t signature[114], const uint8_t public_key[57], 412 return ossl_c448_ed448_verify_prehash(ctx, signature, public_key, hash, 376 ossl_ed448_sign(OSSL_LIB_CTX *ctx, uint8_t *out_sig, const uint8_t *message, size_t message_len, const uint8_t public_key[57], const uint8_t private_key[57], const uint8_t *context, size_t context_len, const char *propq) argument 387 ossl_ed448_verify(OSSL_LIB_CTX *ctx, const uint8_t *message, size_t message_len, const uint8_t signature[114], const uint8_t public_key[57], const uint8_t *context, size_t context_len, const char *propq) argument 397 ossl_ed448ph_sign(OSSL_LIB_CTX *ctx, uint8_t *out_sig, const uint8_t hash[64], const uint8_t public_key[57], const uint8_t private_key[57], const uint8_t *context, size_t context_len, const char *propq) argument 407 ossl_ed448ph_verify(OSSL_LIB_CTX *ctx, const uint8_t hash[64], const uint8_t signature[114], const uint8_t public_key[57], const uint8_t *context, size_t context_len, const char *propq) argument
|
/freebsd-current/crypto/openssl/crypto/ct/ |
H A D | ct_log.c | 29 EVP_PKEY *public_key; member in struct:ctlog_st 267 CTLOG *CTLOG_new_ex(EVP_PKEY *public_key, const char *name, OSSL_LIB_CTX *libctx, argument 292 if (ct_v1_log_id_from_pkey(ret, public_key) != 1) 295 ret->public_key = public_key; 302 CTLOG *CTLOG_new(EVP_PKEY *public_key, const char *name) argument 304 return CTLOG_new_ex(public_key, name, NULL, NULL); 312 EVP_PKEY_free(log->public_key); 332 return log->public_key;
|
/freebsd-current/crypto/openssl/include/crypto/ |
H A D | ecx.h | 98 const uint8_t public_key[32], const uint8_t private_key[32], 102 const uint8_t signature[64], const uint8_t public_key[32], 110 size_t message_len, const uint8_t public_key[57], 116 const uint8_t signature[114], const uint8_t public_key[57],
|
/freebsd-current/contrib/wireguard-tools/ |
H A D | show.c | 216 terminal_printf(" " TERMINAL_BOLD "public key" TERMINAL_RESET ": %s\n", key(device->public_key)); 228 terminal_printf(TERMINAL_FG_YELLOW TERMINAL_BOLD "peer" TERMINAL_RESET ": " TERMINAL_FG_YELLOW "%s" TERMINAL_RESET "\n", key(peer->public_key)); 261 printf("%s\t", maybe_key(device->public_key, device->flags & WGDEVICE_HAS_PUBLIC_KEY)); 270 printf("%s\t", key(peer->public_key)); 298 printf("%s\n", maybe_key(device->public_key, device->flags & WGDEVICE_HAS_PUBLIC_KEY)); 318 printf("%s\t", key(peer->public_key)); 328 printf("%s\t", key(peer->public_key)); 339 printf("%s\t%llu\n", key(peer->public_key), (unsigned long long)peer->last_handshake_time.tv_sec); 345 printf("%s\t%" PRIu64 "\t%" PRIu64 "\n", key(peer->public_key), (uint64_t)peer->rx_bytes, (uint64_t)peer->tx_bytes); 352 printf("%s\t%u\n", key(peer->public_key), pee [all...] |
H A D | setconf.c | 66 pubkeys[i].pubkey = peer->public_key; 71 pubkeys[i].pubkey = peer->public_key; 89 memcpy(peer->public_key, pubkeys[i].pubkey, WG_KEY_LEN);
|
H A D | containers.h | 52 uint8_t public_key[WG_KEY_LEN]; member in struct:wgpeer 83 uint8_t public_key[WG_KEY_LEN]; member in struct:wgdevice
|
H A D | ipc-freebsd.h | 103 if (binary && size == sizeof(dev->public_key)) { 104 memcpy(dev->public_key, binary, sizeof(dev->public_key)); 131 if (binary && size == sizeof(peer->public_key)) { 132 memcpy(peer->public_key, binary, sizeof(peer->public_key)); 295 nvlist_add_binary(nvl_peers[i], "public-key", peer->public_key, sizeof(peer->public_key));
|
H A D | ipc-uapi.h | 56 key_to_hex(hex, peer->public_key); 57 fprintf(f, "public_key=%s\n", hex); 178 curve25519_generate_public(dev->public_key, dev->private_key); 186 } else if (!strcmp(key, "public_key")) { 199 if (!key_from_hex(peer->public_key, value))
|
H A D | showconf.c | 51 key_to_base64(base64, peer->public_key);
|
/freebsd-current/crypto/openssh/regress/misc/sk-dummy/ |
H A D | sk-dummy.c | 102 response->public_key = NULL; 129 if ((response->public_key = malloc(response->public_key_len)) == NULL) { 134 response->public_key, response->public_key_len, NULL) == 0) { 157 if (response->public_key != NULL) { 158 memset(response->public_key, 0, 160 free(response->public_key); 161 response->public_key = NULL; 185 response->public_key = NULL; 195 if ((response->public_key = malloc(response->public_key_len)) == NULL) { 199 memcpy(response->public_key, p [all...] |
/freebsd-current/crypto/openssl/crypto/x509/ |
H A D | x_pubkey.c | 33 ASN1_BIT_STRING *public_key; member in struct:X509_pubkey_st 65 ASN1_SIMPLE(X509_PUBKEY, public_key, ASN1_BIT_STRING) 91 ASN1_BIT_STRING_free(pubkey->public_key); 105 && (pubkey->public_key != NULL 106 || (pubkey->public_key = ASN1_BIT_STRING_new()) != NULL); 290 || (pubkey->public_key = ASN1_BIT_STRING_new()) == NULL 291 || !ASN1_BIT_STRING_set(pubkey->public_key, 292 a->public_key->data, 293 a->public_key->length)) { 1011 OPENSSL_free(pub->public_key [all...] |
/freebsd-current/crypto/openssh/ |
H A D | sk-api.h | 45 uint8_t *public_key; member in struct:sk_enroll_response
|
H A D | kexecdh.c | 54 const EC_POINT *public_key; local 67 public_key = EC_KEY_get0_public_key(client_key); 73 if ((r = sshbuf_put_ec(buf, public_key, group)) != 0 ||
|
H A D | sk-usbhid.c | 613 response->public_key = NULL; 649 if ((response->public_key = malloc(response->public_key_len)) == NULL) { 654 response->public_key, response->public_key_len, NULL) == 0) { 661 if (ret != 0 && response->public_key != NULL) { 662 memset(response->public_key, 0, response->public_key_len); 663 free(response->public_key); 664 response->public_key = NULL; 682 response->public_key = NULL; 694 if ((response->public_key = malloc(response->public_key_len)) == NULL) { 698 memcpy(response->public_key, pt [all...] |
H A D | ssh-sk.c | 186 freezero(r->public_key, r->public_key_len); 228 resp->public_key, resp->public_key_len)) != 0) { 282 memcpy(key->ed25519_pk, resp->public_key, ED25519_PK_SZ); 302 if (resp->public_key == NULL || resp->key_handle == NULL) { 752 freezero(rks[i]->key.public_key, rks[i]->key.public_key_len);
|
/freebsd-current/contrib/wpa/src/wps/ |
H A D | wps_attr_parse.h | 66 const u8 *public_key; member in struct:wps_parse_attr
|
/freebsd-current/crypto/openssl/crypto/cms/ |
H A D | cms_dh.c | 25 ASN1_INTEGER *public_key = NULL; local 50 if ((public_key = d2i_ASN1_INTEGER(NULL, &p, plen)) == NULL) 57 if ((bnpub = ASN1_INTEGER_to_BN(public_key, NULL)) == NULL) 73 ASN1_INTEGER_free(public_key);
|
/freebsd-current/crypto/openssl/crypto/dsa/ |
H A D | dsa_ameth.c | 37 ASN1_INTEGER *public_key = NULL; local 65 if ((public_key = d2i_ASN1_INTEGER(NULL, &p, pklen)) == NULL) { 70 if ((dsa->pub_key = ASN1_INTEGER_to_BN(public_key, NULL)) == NULL) { 76 ASN1_INTEGER_free(public_key); 81 ASN1_INTEGER_free(public_key);
|
/freebsd-current/contrib/wpa/src/tls/ |
H A D | x509v3.h | 63 u8 *public_key; member in struct:x509_certificate
|
H A D | x509v3.c | 56 os_free(cert->public_key); 270 os_free(cert->public_key); 271 cert->public_key = os_memdup(pos + 1, hdr.length - 1); 272 if (cert->public_key == NULL) { 279 cert->public_key, cert->public_key_len); 1861 pk = crypto_public_key_import(issuer->public_key,
|
H A D | tlsv1_client_ocsp.c | 55 const u8 *addr[1] = { signer->public_key }; 197 hash_len = ocsp_hash_data(&alg.oid, issuer->public_key,
|
/freebsd-current/crypto/heimdal/kdc/ |
H A D | pkinit.c | 53 BIGNUM *public_key; member in struct:pk_client_params::__anon2::__anon3 58 EC_KEY *public_key; member in struct:pk_client_params::__anon2::__anon4 181 if (cp->u.dh.public_key) 182 BN_free(cp->u.dh.public_key); 188 if (cp->u.ecdh.public_key) 189 EC_KEY_free(cp->u.ecdh.public_key); 217 if (client_params->u.dh.public_key == NULL) { 219 krb5_set_error_message(context, ret, "public_key"); 239 dh_gen_keylen = DH_compute_key(dh_gen_key,client_params->u.dh.public_key, client_params->u.dh.key); 255 if (client_params->u.ecdh.public_key [all...] |
/freebsd-current/crypto/openssl/crypto/dh/ |
H A D | dh_ameth.c | 68 ASN1_INTEGER *public_key = NULL; local 90 if ((public_key = d2i_ASN1_INTEGER(NULL, &p, pklen)) == NULL) { 96 if ((dh->pub_key = ASN1_INTEGER_to_BN(public_key, NULL)) == NULL) { 101 ASN1_INTEGER_free(public_key); 106 ASN1_INTEGER_free(public_key);
|
/freebsd-current/crypto/openssl/include/openssl/ |
H A D | ct.h | 477 * Creates a new CT log instance with the given |public_key| and |name| and 480 * Takes ownership of |public_key| but copies |name|. 481 * Returns NULL if malloc fails or if |public_key| cannot be converted to DER. 484 CTLOG *CTLOG_new_ex(EVP_PKEY *public_key, const char *name, OSSL_LIB_CTX *libctx, 491 CTLOG *CTLOG_new(EVP_PKEY *public_key, const char *name);
|