Searched refs:public_key (Results 1 - 25 of 39) sorted by relevance

12

/freebsd-current/crypto/openssl/crypto/ec/curve448/
H A Dcurve448_local.h15 const uint8_t public_key[57], const uint8_t private_key[57],
20 const uint8_t signature[114], const uint8_t public_key[57],
H A Deddsa.c377 size_t message_len, const uint8_t public_key[57],
381 return ossl_c448_ed448_sign(ctx, out_sig, private_key, public_key, message,
388 const uint8_t signature[114], const uint8_t public_key[57],
391 return ossl_c448_ed448_verify(ctx, signature, public_key, message,
398 const uint8_t public_key[57], const uint8_t private_key[57],
401 return ossl_c448_ed448_sign_prehash(ctx, out_sig, private_key, public_key,
408 const uint8_t signature[114], const uint8_t public_key[57],
412 return ossl_c448_ed448_verify_prehash(ctx, signature, public_key, hash,
376 ossl_ed448_sign(OSSL_LIB_CTX *ctx, uint8_t *out_sig, const uint8_t *message, size_t message_len, const uint8_t public_key[57], const uint8_t private_key[57], const uint8_t *context, size_t context_len, const char *propq) argument
387 ossl_ed448_verify(OSSL_LIB_CTX *ctx, const uint8_t *message, size_t message_len, const uint8_t signature[114], const uint8_t public_key[57], const uint8_t *context, size_t context_len, const char *propq) argument
397 ossl_ed448ph_sign(OSSL_LIB_CTX *ctx, uint8_t *out_sig, const uint8_t hash[64], const uint8_t public_key[57], const uint8_t private_key[57], const uint8_t *context, size_t context_len, const char *propq) argument
407 ossl_ed448ph_verify(OSSL_LIB_CTX *ctx, const uint8_t hash[64], const uint8_t signature[114], const uint8_t public_key[57], const uint8_t *context, size_t context_len, const char *propq) argument
/freebsd-current/crypto/openssl/crypto/ct/
H A Dct_log.c29 EVP_PKEY *public_key; member in struct:ctlog_st
267 CTLOG *CTLOG_new_ex(EVP_PKEY *public_key, const char *name, OSSL_LIB_CTX *libctx, argument
292 if (ct_v1_log_id_from_pkey(ret, public_key) != 1)
295 ret->public_key = public_key;
302 CTLOG *CTLOG_new(EVP_PKEY *public_key, const char *name) argument
304 return CTLOG_new_ex(public_key, name, NULL, NULL);
312 EVP_PKEY_free(log->public_key);
332 return log->public_key;
/freebsd-current/crypto/openssl/include/crypto/
H A Decx.h98 const uint8_t public_key[32], const uint8_t private_key[32],
102 const uint8_t signature[64], const uint8_t public_key[32],
110 size_t message_len, const uint8_t public_key[57],
116 const uint8_t signature[114], const uint8_t public_key[57],
/freebsd-current/contrib/wireguard-tools/
H A Dshow.c216 terminal_printf(" " TERMINAL_BOLD "public key" TERMINAL_RESET ": %s\n", key(device->public_key));
228 terminal_printf(TERMINAL_FG_YELLOW TERMINAL_BOLD "peer" TERMINAL_RESET ": " TERMINAL_FG_YELLOW "%s" TERMINAL_RESET "\n", key(peer->public_key));
261 printf("%s\t", maybe_key(device->public_key, device->flags & WGDEVICE_HAS_PUBLIC_KEY));
270 printf("%s\t", key(peer->public_key));
298 printf("%s\n", maybe_key(device->public_key, device->flags & WGDEVICE_HAS_PUBLIC_KEY));
318 printf("%s\t", key(peer->public_key));
328 printf("%s\t", key(peer->public_key));
339 printf("%s\t%llu\n", key(peer->public_key), (unsigned long long)peer->last_handshake_time.tv_sec);
345 printf("%s\t%" PRIu64 "\t%" PRIu64 "\n", key(peer->public_key), (uint64_t)peer->rx_bytes, (uint64_t)peer->tx_bytes);
352 printf("%s\t%u\n", key(peer->public_key), pee
[all...]
H A Dsetconf.c66 pubkeys[i].pubkey = peer->public_key;
71 pubkeys[i].pubkey = peer->public_key;
89 memcpy(peer->public_key, pubkeys[i].pubkey, WG_KEY_LEN);
H A Dcontainers.h52 uint8_t public_key[WG_KEY_LEN]; member in struct:wgpeer
83 uint8_t public_key[WG_KEY_LEN]; member in struct:wgdevice
H A Dipc-freebsd.h103 if (binary && size == sizeof(dev->public_key)) {
104 memcpy(dev->public_key, binary, sizeof(dev->public_key));
131 if (binary && size == sizeof(peer->public_key)) {
132 memcpy(peer->public_key, binary, sizeof(peer->public_key));
295 nvlist_add_binary(nvl_peers[i], "public-key", peer->public_key, sizeof(peer->public_key));
H A Dipc-uapi.h56 key_to_hex(hex, peer->public_key);
57 fprintf(f, "public_key=%s\n", hex);
178 curve25519_generate_public(dev->public_key, dev->private_key);
186 } else if (!strcmp(key, "public_key")) {
199 if (!key_from_hex(peer->public_key, value))
H A Dshowconf.c51 key_to_base64(base64, peer->public_key);
/freebsd-current/crypto/openssh/regress/misc/sk-dummy/
H A Dsk-dummy.c102 response->public_key = NULL;
129 if ((response->public_key = malloc(response->public_key_len)) == NULL) {
134 response->public_key, response->public_key_len, NULL) == 0) {
157 if (response->public_key != NULL) {
158 memset(response->public_key, 0,
160 free(response->public_key);
161 response->public_key = NULL;
185 response->public_key = NULL;
195 if ((response->public_key = malloc(response->public_key_len)) == NULL) {
199 memcpy(response->public_key, p
[all...]
/freebsd-current/crypto/openssl/crypto/x509/
H A Dx_pubkey.c33 ASN1_BIT_STRING *public_key; member in struct:X509_pubkey_st
65 ASN1_SIMPLE(X509_PUBKEY, public_key, ASN1_BIT_STRING)
91 ASN1_BIT_STRING_free(pubkey->public_key);
105 && (pubkey->public_key != NULL
106 || (pubkey->public_key = ASN1_BIT_STRING_new()) != NULL);
290 || (pubkey->public_key = ASN1_BIT_STRING_new()) == NULL
291 || !ASN1_BIT_STRING_set(pubkey->public_key,
292 a->public_key->data,
293 a->public_key->length)) {
1011 OPENSSL_free(pub->public_key
[all...]
/freebsd-current/crypto/openssh/
H A Dsk-api.h45 uint8_t *public_key; member in struct:sk_enroll_response
H A Dkexecdh.c54 const EC_POINT *public_key; local
67 public_key = EC_KEY_get0_public_key(client_key);
73 if ((r = sshbuf_put_ec(buf, public_key, group)) != 0 ||
H A Dsk-usbhid.c613 response->public_key = NULL;
649 if ((response->public_key = malloc(response->public_key_len)) == NULL) {
654 response->public_key, response->public_key_len, NULL) == 0) {
661 if (ret != 0 && response->public_key != NULL) {
662 memset(response->public_key, 0, response->public_key_len);
663 free(response->public_key);
664 response->public_key = NULL;
682 response->public_key = NULL;
694 if ((response->public_key = malloc(response->public_key_len)) == NULL) {
698 memcpy(response->public_key, pt
[all...]
H A Dssh-sk.c186 freezero(r->public_key, r->public_key_len);
228 resp->public_key, resp->public_key_len)) != 0) {
282 memcpy(key->ed25519_pk, resp->public_key, ED25519_PK_SZ);
302 if (resp->public_key == NULL || resp->key_handle == NULL) {
752 freezero(rks[i]->key.public_key, rks[i]->key.public_key_len);
/freebsd-current/contrib/wpa/src/wps/
H A Dwps_attr_parse.h66 const u8 *public_key; member in struct:wps_parse_attr
/freebsd-current/crypto/openssl/crypto/cms/
H A Dcms_dh.c25 ASN1_INTEGER *public_key = NULL; local
50 if ((public_key = d2i_ASN1_INTEGER(NULL, &p, plen)) == NULL)
57 if ((bnpub = ASN1_INTEGER_to_BN(public_key, NULL)) == NULL)
73 ASN1_INTEGER_free(public_key);
/freebsd-current/crypto/openssl/crypto/dsa/
H A Ddsa_ameth.c37 ASN1_INTEGER *public_key = NULL; local
65 if ((public_key = d2i_ASN1_INTEGER(NULL, &p, pklen)) == NULL) {
70 if ((dsa->pub_key = ASN1_INTEGER_to_BN(public_key, NULL)) == NULL) {
76 ASN1_INTEGER_free(public_key);
81 ASN1_INTEGER_free(public_key);
/freebsd-current/contrib/wpa/src/tls/
H A Dx509v3.h63 u8 *public_key; member in struct:x509_certificate
H A Dx509v3.c56 os_free(cert->public_key);
270 os_free(cert->public_key);
271 cert->public_key = os_memdup(pos + 1, hdr.length - 1);
272 if (cert->public_key == NULL) {
279 cert->public_key, cert->public_key_len);
1861 pk = crypto_public_key_import(issuer->public_key,
H A Dtlsv1_client_ocsp.c55 const u8 *addr[1] = { signer->public_key };
197 hash_len = ocsp_hash_data(&alg.oid, issuer->public_key,
/freebsd-current/crypto/heimdal/kdc/
H A Dpkinit.c53 BIGNUM *public_key; member in struct:pk_client_params::__anon2::__anon3
58 EC_KEY *public_key; member in struct:pk_client_params::__anon2::__anon4
181 if (cp->u.dh.public_key)
182 BN_free(cp->u.dh.public_key);
188 if (cp->u.ecdh.public_key)
189 EC_KEY_free(cp->u.ecdh.public_key);
217 if (client_params->u.dh.public_key == NULL) {
219 krb5_set_error_message(context, ret, "public_key");
239 dh_gen_keylen = DH_compute_key(dh_gen_key,client_params->u.dh.public_key, client_params->u.dh.key);
255 if (client_params->u.ecdh.public_key
[all...]
/freebsd-current/crypto/openssl/crypto/dh/
H A Ddh_ameth.c68 ASN1_INTEGER *public_key = NULL; local
90 if ((public_key = d2i_ASN1_INTEGER(NULL, &p, pklen)) == NULL) {
96 if ((dh->pub_key = ASN1_INTEGER_to_BN(public_key, NULL)) == NULL) {
101 ASN1_INTEGER_free(public_key);
106 ASN1_INTEGER_free(public_key);
/freebsd-current/crypto/openssl/include/openssl/
H A Dct.h477 * Creates a new CT log instance with the given |public_key| and |name| and
480 * Takes ownership of |public_key| but copies |name|.
481 * Returns NULL if malloc fails or if |public_key| cannot be converted to DER.
484 CTLOG *CTLOG_new_ex(EVP_PKEY *public_key, const char *name, OSSL_LIB_CTX *libctx,
491 CTLOG *CTLOG_new(EVP_PKEY *public_key, const char *name);

Completed in 398 milliseconds

12