/openbsd-current/lib/libcrypto/curve25519/ |
H A D | curve25519.h | 84 * |message| using |public_key| and |private_key|. It returns one on success 88 const uint8_t public_key[ED25519_PUBLIC_KEY_LENGTH], 93 * |public_key| of |message_len| bytes from |message|. It returns zero 98 const uint8_t public_key[ED25519_PUBLIC_KEY_LENGTH]);
|
H A D | curve25519.c | 4642 const uint8_t public_key[ED25519_PUBLIC_KEY_LENGTH], 4665 SHA512_Update(&hash_ctx, public_key, 32); 4690 const uint8_t public_key[ED25519_PUBLIC_KEY_LENGTH]) { 4694 x25519_ge_frombytes_vartime(&A, public_key) != 0) { 4702 memcpy(pkcopy, public_key, 32); 4725 SHA512_Update(&hash_ctx, public_key, 32); 4641 ED25519_sign(uint8_t *out_sig, const uint8_t *message, size_t message_len, const uint8_t public_key[ED25519_PUBLIC_KEY_LENGTH], const uint8_t private_key[ED25519_PRIVATE_KEY_LENGTH]) argument 4688 ED25519_verify(const uint8_t *message, size_t message_len, const uint8_t signature[ED25519_SIGNATURE_LENGTH], const uint8_t public_key[ED25519_PUBLIC_KEY_LENGTH]) argument
|
/openbsd-current/lib/libcrypto/ct/ |
H A D | ct_log.c | 79 EVP_PKEY *public_key; member in struct:ctlog_st 297 CTLOG_new(EVP_PKEY *public_key, const char *name) argument 312 if (ct_v1_log_id_from_pkey(public_key, ret->log_id) != 1) 315 ret->public_key = public_key; 329 EVP_PKEY_free(log->public_key); 353 return log->public_key;
|
H A D | ct.h | 446 * Creates a new CT log instance with the given |public_key| and |name|. 447 * Takes ownership of |public_key| but copies |name|. 448 * Returns NULL if malloc fails or if |public_key| cannot be converted to DER. 451 CTLOG *CTLOG_new(EVP_PKEY *public_key, const char *name);
|
/openbsd-current/lib/libcrypto/x509/ |
H A D | x509_skey.c | 142 pk = ctx->subject_req->req_info->pubkey->public_key; 144 pk = ctx->subject_cert->cert_info->key->public_key;
|
H A D | x509_req.c | 82 EVP_PKEY *public_key; local 94 if ((public_key = X509_get0_pubkey(x509)) == NULL) 96 if (!X509_REQ_set_pubkey(req, public_key))
|
H A D | x509_cmp.c | 377 return x->cert_info->key->public_key;
|
H A D | x509_local.h | 76 ASN1_BIT_STRING *public_key; member in struct:X509_pubkey_st
|
/openbsd-current/usr.bin/ssh/ |
H A D | kexecdh.c | 50 const EC_POINT *public_key; local 63 public_key = EC_KEY_get0_public_key(client_key); 69 if ((r = sshbuf_put_ec(buf, public_key, group)) != 0 ||
|
H A D | sk-api.h | 43 uint8_t *public_key; member in struct:sk_enroll_response
|
H A D | sk-usbhid.c | 486 response->public_key = NULL; 522 if ((response->public_key = malloc(response->public_key_len)) == NULL) { 527 response->public_key, response->public_key_len, NULL) == 0) { 534 if (ret != 0 && response->public_key != NULL) { 535 memset(response->public_key, 0, response->public_key_len); 536 free(response->public_key); 537 response->public_key = NULL; 555 response->public_key = NULL; 567 if ((response->public_key = malloc(response->public_key_len)) == NULL) { 571 memcpy(response->public_key, pt [all...] |
H A D | ssh-sk.c | 167 freezero(r->public_key, r->public_key_len); 209 resp->public_key, resp->public_key_len)) != 0) { 263 memcpy(key->ed25519_pk, resp->public_key, ED25519_PK_SZ); 283 if (resp->public_key == NULL || resp->key_handle == NULL) { 733 freezero(rks[i]->key.public_key, rks[i]->key.public_key_len);
|
H A D | pkcs11.h | 965 ck_object_handle_t *public_key,
|
/openbsd-current/regress/usr.bin/ssh/misc/sk-dummy/ |
H A D | sk-dummy.c | 86 response->public_key = NULL; 113 if ((response->public_key = malloc(response->public_key_len)) == NULL) { 118 response->public_key, response->public_key_len, NULL) == 0) { 141 if (response->public_key != NULL) { 142 memset(response->public_key, 0, 144 free(response->public_key); 145 response->public_key = NULL; 166 response->public_key = NULL; 176 if ((response->public_key = malloc(response->public_key_len)) == NULL) { 180 memcpy(response->public_key, p [all...] |
/openbsd-current/regress/lib/libcrypto/curve25519/ |
H A D | ed25519test.c | 372 dump_info(const uint8_t *message, size_t message_len, const uint8_t *public_key, argument 380 hexdump(public_key, ED25519_PUBLIC_KEY_LENGTH); 425 uint8_t public_key[ED25519_PUBLIC_KEY_LENGTH]; local 431 ED25519_keypair(public_key, private_key); 435 public_key, private_key)) { 437 dump_info(message, sizeof(message), public_key, private_key, 442 if (!ED25519_verify(message, sizeof(message), signature, public_key)) { 444 dump_info(message, sizeof(message), public_key, private_key, 451 if (ED25519_verify(message, sizeof(message), signature, public_key)) { 453 dump_info(message, sizeof(message), public_key, private_ke [all...] |
/openbsd-current/lib/libcrypto/asn1/ |
H A D | x_pubkey.c | 99 .offset = offsetof(X509_PUBKEY, public_key), 100 .field_name = "public_key", 194 if (key->public_key == NULL) 754 ASN1_STRING_set0(pub->public_key, penc, penclen); 756 return asn1_abs_set_unused_bits(pub->public_key, 0); 767 *pk = pub->public_key->data; 768 *ppklen = pub->public_key->length;
|
H A D | t_x509.c | 292 if (!EVP_Digest(x->cert_info->key->public_key->data, 293 x->cert_info->key->public_key->length,
|
/openbsd-current/lib/libcrypto/ec/ |
H A D | ec_ameth.c | 498 const EC_POINT *public_key; local 511 public_key = EC_KEY_get0_public_key(x); 512 if (public_key != NULL) { 513 if ((pub_key = EC_POINT_point2bn(group, public_key,
|
/openbsd-current/lib/libcrypto/evp/ |
H A D | p_lib.c | 512 const unsigned char *public_key, size_t len) 526 if (!pkey->ameth->set_pub_key(pkey, public_key, len)) { 511 EVP_PKEY_new_raw_public_key(int type, ENGINE *engine, const unsigned char *public_key, size_t len) argument
|
H A D | evp_local.h | 146 int (*set_pub_key)(EVP_PKEY *pk, const unsigned char *public_key,
|
H A D | evp.h | 408 const unsigned char *public_key, size_t len);
|