/freebsd/crypto/openssl/crypto/ct/ |
H A D | ct_log.c | 29 EVP_PKEY *public_key; member 267 CTLOG *CTLOG_new_ex(EVP_PKEY *public_key, const char *name, OSSL_LIB_CTX *libctx, in CTLOG_new_ex() argument 292 if (ct_v1_log_id_from_pkey(ret, public_key) != 1) in CTLOG_new_ex() 295 ret->public_key = public_key; in CTLOG_new_ex() 302 CTLOG *CTLOG_new(EVP_PKEY *public_key, const char *name) in CTLOG_new() argument 304 return CTLOG_new_ex(public_key, name, NULL, NULL); in CTLOG_new() 312 EVP_PKEY_free(log->public_key); in CTLOG_free() 332 return log->public_key; in CTLOG_get0_public_key()
|
/freebsd/contrib/wireguard-tools/ |
H A D | show.c | 216 terminal_printf(" " TERMINAL_BOLD "public key" TERMINAL_RESET ": %s\n", key(device->public_key)); in pretty_print() 228 …OLD "peer" TERMINAL_RESET ": " TERMINAL_FG_YELLOW "%s" TERMINAL_RESET "\n", key(peer->public_key)); in pretty_print() 261 printf("%s\t", maybe_key(device->public_key, device->flags & WGDEVICE_HAS_PUBLIC_KEY)); in dump_print() 270 printf("%s\t", key(peer->public_key)); in dump_print() 298 printf("%s\n", maybe_key(device->public_key, device->flags & WGDEVICE_HAS_PUBLIC_KEY)); in ugly_print() 318 printf("%s\t", key(peer->public_key)); in ugly_print() 328 printf("%s\t", key(peer->public_key)); in ugly_print() 339 … printf("%s\t%llu\n", key(peer->public_key), (unsigned long long)peer->last_handshake_time.tv_sec); in ugly_print() 345 …printf("%s\t%" PRIu64 "\t%" PRIu64 "\n", key(peer->public_key), (uint64_t)peer->rx_bytes, (uint64_… in ugly_print() 352 printf("%s\t%u\n", key(peer->public_key), peer->persistent_keepalive_interval); in ugly_print() [all …]
|
H A D | ipc-freebsd.h | 103 if (binary && size == sizeof(dev->public_key)) { in kernel_get_device() 104 memcpy(dev->public_key, binary, sizeof(dev->public_key)); in kernel_get_device() 131 if (binary && size == sizeof(peer->public_key)) { in kernel_get_device() 132 memcpy(peer->public_key, binary, sizeof(peer->public_key)); in kernel_get_device() 295 nvlist_add_binary(nvl_peers[i], "public-key", peer->public_key, sizeof(peer->public_key)); in kernel_set_device()
|
H A D | setconf.c | 66 pubkeys[i].pubkey = peer->public_key; in sync_conf() 71 pubkeys[i].pubkey = peer->public_key; in sync_conf() 89 memcpy(peer->public_key, pubkeys[i].pubkey, WG_KEY_LEN); in sync_conf()
|
H A D | containers.h | 52 uint8_t public_key[WG_KEY_LEN]; member 83 uint8_t public_key[WG_KEY_LEN]; member
|
H A D | ipc-uapi.h | 56 key_to_hex(hex, peer->public_key); in userspace_set_device() 178 curve25519_generate_public(dev->public_key, dev->private_key); in userspace_get_device() 199 if (!key_from_hex(peer->public_key, value)) in userspace_get_device()
|
H A D | showconf.c | 51 key_to_base64(base64, peer->public_key); in showconf_main()
|
/freebsd/crypto/openssh/regress/misc/sk-dummy/ |
H A D | sk-dummy.c | 102 response->public_key = NULL; in pack_key_ecdsa() 129 if ((response->public_key = malloc(response->public_key_len)) == NULL) { in pack_key_ecdsa() 134 response->public_key, response->public_key_len, NULL) == 0) { in pack_key_ecdsa() 157 if (response->public_key != NULL) { in pack_key_ecdsa() 158 memset(response->public_key, 0, in pack_key_ecdsa() 160 free(response->public_key); in pack_key_ecdsa() 161 response->public_key = NULL; in pack_key_ecdsa() 185 response->public_key = NULL; in pack_key_ed25519() 195 if ((response->public_key = malloc(response->public_key_len)) == NULL) { in pack_key_ed25519() 199 memcpy(response->public_key, pk, sizeof(pk)); in pack_key_ed25519() [all …]
|
/freebsd/crypto/openssl/crypto/x509/ |
H A D | x_pubkey.c | 33 ASN1_BIT_STRING *public_key; member 65 ASN1_SIMPLE(X509_PUBKEY, public_key, ASN1_BIT_STRING) 91 ASN1_BIT_STRING_free(pubkey->public_key); in x509_pubkey_ex_free() 105 && (pubkey->public_key != NULL in x509_pubkey_ex_populate() 106 || (pubkey->public_key = ASN1_BIT_STRING_new()) != NULL); in x509_pubkey_ex_populate() 290 || (pubkey->public_key = ASN1_BIT_STRING_new()) == NULL in X509_PUBKEY_dup() 291 || !ASN1_BIT_STRING_set(pubkey->public_key, in X509_PUBKEY_dup() 292 a->public_key->data, in X509_PUBKEY_dup() 293 a->public_key->length)) { in X509_PUBKEY_dup() 1011 OPENSSL_free(pub->public_key->data); in X509_PUBKEY_set0_param() [all …]
|
/freebsd/crypto/openssl/crypto/ec/curve448/ |
H A D | eddsa.c | 377 size_t message_len, const uint8_t public_key[57], in ossl_ed448_sign() 381 return ossl_c448_ed448_sign(ctx, out_sig, private_key, public_key, message, in ossl_ed448_sign() 388 const uint8_t signature[114], const uint8_t public_key[57], in ossl_ed448_verify() 391 return ossl_c448_ed448_verify(ctx, signature, public_key, message, in ossl_ed448_verify() 398 const uint8_t public_key[57], const uint8_t private_key[57], in ossl_ed448ph_sign() 401 return ossl_c448_ed448_sign_prehash(ctx, out_sig, private_key, public_key, in ossl_ed448ph_sign() 408 const uint8_t signature[114], const uint8_t public_key[57], in ossl_ed448ph_verify() 412 return ossl_c448_ed448_verify_prehash(ctx, signature, public_key, hash, in ossl_ed448ph_verify()
|
H A D | curve448_local.h | 15 const uint8_t public_key[57], const uint8_t private_key[57], 20 const uint8_t signature[114], const uint8_t public_key[57],
|
/freebsd/crypto/openssl/include/crypto/ |
H A D | ecx.h | 98 const uint8_t public_key[32], const uint8_t private_key[32], 102 const uint8_t signature[64], const uint8_t public_key[32], 110 size_t message_len, const uint8_t public_key[57], 116 const uint8_t signature[114], const uint8_t public_key[57],
|
/freebsd/crypto/openssh/ |
H A D | sk-usbhid.c | 613 response->public_key = NULL; in pack_public_key_ecdsa() 649 if ((response->public_key = malloc(response->public_key_len)) == NULL) { in pack_public_key_ecdsa() 654 response->public_key, response->public_key_len, NULL) == 0) { in pack_public_key_ecdsa() 661 if (ret != 0 && response->public_key != NULL) { in pack_public_key_ecdsa() 662 memset(response->public_key, 0, response->public_key_len); in pack_public_key_ecdsa() 663 free(response->public_key); in pack_public_key_ecdsa() 664 response->public_key = NULL; in pack_public_key_ecdsa() 682 response->public_key = NULL; in pack_public_key_ed25519() 694 if ((response->public_key = malloc(response->public_key_len)) == NULL) { in pack_public_key_ed25519() 698 memcpy(response->public_key, ptr, len); in pack_public_key_ed25519() [all …]
|
H A D | kexecdh.c | 54 const EC_POINT *public_key; in kex_ecdh_keypair() local 67 public_key = EC_KEY_get0_public_key(client_key); in kex_ecdh_keypair() 73 if ((r = sshbuf_put_ec(buf, public_key, group)) != 0 || in kex_ecdh_keypair()
|
H A D | ssh-sk.c | 187 freezero(r->public_key, r->public_key_len); in sshsk_free_enroll_response() 232 resp->public_key, resp->public_key_len)) != 0) { in sshsk_ecdsa_assemble() 297 memcpy(key->ed25519_pk, resp->public_key, ED25519_PK_SZ); in sshsk_ed25519_assemble() 317 if (resp->public_key == NULL || resp->key_handle == NULL) { in sshsk_key_from_response() 767 freezero(rks[i]->key.public_key, rks[i]->key.public_key_len); in sshsk_free_sk_resident_keys()
|
H A D | sk-api.h | 45 uint8_t *public_key; member
|
H A D | libcrux_mlkem768_sha3.h | 9384 Eurydice_slice public_key, in libcrux_ml_kem_serialize_deserialize_ring_elements_reduced_33() argument 9391 i < Eurydice_slice_len(public_key, uint8_t) / in libcrux_ml_kem_serialize_deserialize_ring_elements_reduced_33() 9396 public_key, i0 * LIBCRUX_ML_KEM_CONSTANTS_BYTES_PER_RING_ELEMENT, in libcrux_ml_kem_serialize_deserialize_ring_elements_reduced_33() 10805 static inline void libcrux_ml_kem_ind_cpa_encrypt_60(Eurydice_slice public_key, in libcrux_ml_kem_ind_cpa_encrypt_60() argument 10811 Eurydice_slice_subslice_to(public_key, (size_t)1152U, uint8_t, size_t), in libcrux_ml_kem_ind_cpa_encrypt_60() 10814 Eurydice_slice_subslice_from(public_key, (size_t)1152U, uint8_t, size_t); in libcrux_ml_kem_ind_cpa_encrypt_60() 11085 libcrux_ml_kem_types_MlKemPublicKey_15 *public_key, in libcrux_ml_kem_ind_cca_encapsulate_cd() argument 11099 libcrux_ml_kem_types_as_slice_cb_50(public_key), in libcrux_ml_kem_ind_cca_encapsulate_cd() 11114 (size_t)1184U, libcrux_ml_kem_types_as_slice_cb_50(public_key), uint8_t); in libcrux_ml_kem_ind_cca_encapsulate_cd() 11159 libcrux_ml_kem_types_MlKemPublicKey_15 *public_key, in libcrux_ml_kem_ind_cca_instantiations_portable_encapsulate_c6() argument [all …]
|
/freebsd/crypto/openssl/crypto/cms/ |
H A D | cms_dh.c | 25 ASN1_INTEGER *public_key = NULL; in dh_cms_set_peerkey() local 50 if ((public_key = d2i_ASN1_INTEGER(NULL, &p, plen)) == NULL) in dh_cms_set_peerkey() 57 if ((bnpub = ASN1_INTEGER_to_BN(public_key, NULL)) == NULL) in dh_cms_set_peerkey() 73 ASN1_INTEGER_free(public_key); in dh_cms_set_peerkey()
|
/freebsd/crypto/openssl/crypto/dsa/ |
H A D | dsa_ameth.c | 37 ASN1_INTEGER *public_key = NULL; in dsa_pub_decode() local 65 if ((public_key = d2i_ASN1_INTEGER(NULL, &p, pklen)) == NULL) { in dsa_pub_decode() 70 if ((dsa->pub_key = ASN1_INTEGER_to_BN(public_key, NULL)) == NULL) { in dsa_pub_decode() 76 ASN1_INTEGER_free(public_key); in dsa_pub_decode() 81 ASN1_INTEGER_free(public_key); in dsa_pub_decode()
|
/freebsd/crypto/openssl/crypto/dh/ |
H A D | dh_ameth.c | 68 ASN1_INTEGER *public_key = NULL; in dh_pub_decode() local 90 if ((public_key = d2i_ASN1_INTEGER(NULL, &p, pklen)) == NULL) { in dh_pub_decode() 96 if ((dh->pub_key = ASN1_INTEGER_to_BN(public_key, NULL)) == NULL) { in dh_pub_decode() 101 ASN1_INTEGER_free(public_key); in dh_pub_decode() 106 ASN1_INTEGER_free(public_key); in dh_pub_decode()
|
/freebsd/crypto/heimdal/kdc/ |
H A D | pkinit.c | 53 BIGNUM *public_key; member 58 EC_KEY *public_key; member 181 if (cp->u.dh.public_key) in _kdc_pk_free_client_param() 182 BN_free(cp->u.dh.public_key); in _kdc_pk_free_client_param() 188 if (cp->u.ecdh.public_key) in _kdc_pk_free_client_param() 189 EC_KEY_free(cp->u.ecdh.public_key); in _kdc_pk_free_client_param() 217 if (client_params->u.dh.public_key == NULL) { in generate_dh_keyblock() 239 dh_gen_keylen = DH_compute_key(dh_gen_key,client_params->u.dh.public_key, client_params->u.dh.key); in generate_dh_keyblock() 255 if (client_params->u.ecdh.public_key == NULL) { in generate_dh_keyblock() 267 EC_KEY_get0_group(client_params->u.ecdh.public_key)); in generate_dh_keyblock() [all …]
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | CTLOG_new.pod | 14 CTLOG *CTLOG_new_ex(EVP_PKEY *public_key, const char *name, 16 CTLOG *CTLOG_new(EVP_PKEY *public_key, const char *name);
|
/freebsd/contrib/wpa/src/wps/ |
H A D | wps_attr_parse.h | 66 const u8 *public_key; member
|
/freebsd/crypto/openssl/include/openssl/ |
H A D | ct.h.in | 429 * Creates a new CT log instance with the given |public_key| and |name| and 432 * Takes ownership of |public_key| but copies |name|. 433 * Returns NULL if malloc fails or if |public_key| cannot be converted to DER. 436 CTLOG *CTLOG_new_ex(EVP_PKEY *public_key, const char *name, OSSL_LIB_CTX *libctx, 443 CTLOG *CTLOG_new(EVP_PKEY *public_key, const char *name);
|
/freebsd/contrib/wpa/src/tls/ |
H A D | x509v3.h | 63 u8 *public_key; member
|