Searched refs:public_key (Results 1 - 21 of 21) sorted by relevance

/openbsd-current/lib/libcrypto/curve25519/
H A Dcurve25519.h84 * |message| using |public_key| and |private_key|. It returns one on success
88 const uint8_t public_key[ED25519_PUBLIC_KEY_LENGTH],
93 * |public_key| of |message_len| bytes from |message|. It returns zero
98 const uint8_t public_key[ED25519_PUBLIC_KEY_LENGTH]);
H A Dcurve25519.c4642 const uint8_t public_key[ED25519_PUBLIC_KEY_LENGTH],
4665 SHA512_Update(&hash_ctx, public_key, 32);
4690 const uint8_t public_key[ED25519_PUBLIC_KEY_LENGTH]) {
4694 x25519_ge_frombytes_vartime(&A, public_key) != 0) {
4702 memcpy(pkcopy, public_key, 32);
4725 SHA512_Update(&hash_ctx, public_key, 32);
4641 ED25519_sign(uint8_t *out_sig, const uint8_t *message, size_t message_len, const uint8_t public_key[ED25519_PUBLIC_KEY_LENGTH], const uint8_t private_key[ED25519_PRIVATE_KEY_LENGTH]) argument
4688 ED25519_verify(const uint8_t *message, size_t message_len, const uint8_t signature[ED25519_SIGNATURE_LENGTH], const uint8_t public_key[ED25519_PUBLIC_KEY_LENGTH]) argument
/openbsd-current/lib/libcrypto/ct/
H A Dct_log.c79 EVP_PKEY *public_key; member in struct:ctlog_st
297 CTLOG_new(EVP_PKEY *public_key, const char *name) argument
312 if (ct_v1_log_id_from_pkey(public_key, ret->log_id) != 1)
315 ret->public_key = public_key;
329 EVP_PKEY_free(log->public_key);
353 return log->public_key;
H A Dct.h446 * Creates a new CT log instance with the given |public_key| and |name|.
447 * Takes ownership of |public_key| but copies |name|.
448 * Returns NULL if malloc fails or if |public_key| cannot be converted to DER.
451 CTLOG *CTLOG_new(EVP_PKEY *public_key, const char *name);
/openbsd-current/lib/libcrypto/x509/
H A Dx509_skey.c142 pk = ctx->subject_req->req_info->pubkey->public_key;
144 pk = ctx->subject_cert->cert_info->key->public_key;
H A Dx509_req.c82 EVP_PKEY *public_key; local
94 if ((public_key = X509_get0_pubkey(x509)) == NULL)
96 if (!X509_REQ_set_pubkey(req, public_key))
H A Dx509_cmp.c377 return x->cert_info->key->public_key;
H A Dx509_local.h76 ASN1_BIT_STRING *public_key; member in struct:X509_pubkey_st
/openbsd-current/usr.bin/ssh/
H A Dkexecdh.c50 const EC_POINT *public_key; local
63 public_key = EC_KEY_get0_public_key(client_key);
69 if ((r = sshbuf_put_ec(buf, public_key, group)) != 0 ||
H A Dsk-api.h43 uint8_t *public_key; member in struct:sk_enroll_response
H A Dsk-usbhid.c486 response->public_key = NULL;
522 if ((response->public_key = malloc(response->public_key_len)) == NULL) {
527 response->public_key, response->public_key_len, NULL) == 0) {
534 if (ret != 0 && response->public_key != NULL) {
535 memset(response->public_key, 0, response->public_key_len);
536 free(response->public_key);
537 response->public_key = NULL;
555 response->public_key = NULL;
567 if ((response->public_key = malloc(response->public_key_len)) == NULL) {
571 memcpy(response->public_key, pt
[all...]
H A Dssh-sk.c167 freezero(r->public_key, r->public_key_len);
209 resp->public_key, resp->public_key_len)) != 0) {
263 memcpy(key->ed25519_pk, resp->public_key, ED25519_PK_SZ);
283 if (resp->public_key == NULL || resp->key_handle == NULL) {
733 freezero(rks[i]->key.public_key, rks[i]->key.public_key_len);
H A Dpkcs11.h965 ck_object_handle_t *public_key,
/openbsd-current/regress/usr.bin/ssh/misc/sk-dummy/
H A Dsk-dummy.c86 response->public_key = NULL;
113 if ((response->public_key = malloc(response->public_key_len)) == NULL) {
118 response->public_key, response->public_key_len, NULL) == 0) {
141 if (response->public_key != NULL) {
142 memset(response->public_key, 0,
144 free(response->public_key);
145 response->public_key = NULL;
166 response->public_key = NULL;
176 if ((response->public_key = malloc(response->public_key_len)) == NULL) {
180 memcpy(response->public_key, p
[all...]
/openbsd-current/regress/lib/libcrypto/curve25519/
H A Ded25519test.c372 dump_info(const uint8_t *message, size_t message_len, const uint8_t *public_key, argument
380 hexdump(public_key, ED25519_PUBLIC_KEY_LENGTH);
425 uint8_t public_key[ED25519_PUBLIC_KEY_LENGTH]; local
431 ED25519_keypair(public_key, private_key);
435 public_key, private_key)) {
437 dump_info(message, sizeof(message), public_key, private_key,
442 if (!ED25519_verify(message, sizeof(message), signature, public_key)) {
444 dump_info(message, sizeof(message), public_key, private_key,
451 if (ED25519_verify(message, sizeof(message), signature, public_key)) {
453 dump_info(message, sizeof(message), public_key, private_ke
[all...]
/openbsd-current/lib/libcrypto/asn1/
H A Dx_pubkey.c99 .offset = offsetof(X509_PUBKEY, public_key),
100 .field_name = "public_key",
194 if (key->public_key == NULL)
754 ASN1_STRING_set0(pub->public_key, penc, penclen);
756 return asn1_abs_set_unused_bits(pub->public_key, 0);
767 *pk = pub->public_key->data;
768 *ppklen = pub->public_key->length;
H A Dt_x509.c292 if (!EVP_Digest(x->cert_info->key->public_key->data,
293 x->cert_info->key->public_key->length,
/openbsd-current/lib/libcrypto/ec/
H A Dec_ameth.c498 const EC_POINT *public_key; local
511 public_key = EC_KEY_get0_public_key(x);
512 if (public_key != NULL) {
513 if ((pub_key = EC_POINT_point2bn(group, public_key,
/openbsd-current/lib/libcrypto/evp/
H A Dp_lib.c512 const unsigned char *public_key, size_t len)
526 if (!pkey->ameth->set_pub_key(pkey, public_key, len)) {
511 EVP_PKEY_new_raw_public_key(int type, ENGINE *engine, const unsigned char *public_key, size_t len) argument
H A Devp_local.h146 int (*set_pub_key)(EVP_PKEY *pk, const unsigned char *public_key,
H A Devp.h408 const unsigned char *public_key, size_t len);

Completed in 512 milliseconds