Home
last modified time | relevance | path

Searched refs:public_key (Results 1 – 25 of 44) sorted by relevance

12

/freebsd/crypto/openssl/crypto/ct/
H A Dct_log.c29 EVP_PKEY *public_key; member
267 CTLOG *CTLOG_new_ex(EVP_PKEY *public_key, const char *name, OSSL_LIB_CTX *libctx, in CTLOG_new_ex() argument
292 if (ct_v1_log_id_from_pkey(ret, public_key) != 1) in CTLOG_new_ex()
295 ret->public_key = public_key; in CTLOG_new_ex()
302 CTLOG *CTLOG_new(EVP_PKEY *public_key, const char *name) in CTLOG_new() argument
304 return CTLOG_new_ex(public_key, name, NULL, NULL); in CTLOG_new()
312 EVP_PKEY_free(log->public_key); in CTLOG_free()
332 return log->public_key; in CTLOG_get0_public_key()
/freebsd/contrib/wireguard-tools/
H A Dshow.c216 terminal_printf(" " TERMINAL_BOLD "public key" TERMINAL_RESET ": %s\n", key(device->public_key)); in pretty_print()
228 …OLD "peer" TERMINAL_RESET ": " TERMINAL_FG_YELLOW "%s" TERMINAL_RESET "\n", key(peer->public_key)); in pretty_print()
261 printf("%s\t", maybe_key(device->public_key, device->flags & WGDEVICE_HAS_PUBLIC_KEY)); in dump_print()
270 printf("%s\t", key(peer->public_key)); in dump_print()
298 printf("%s\n", maybe_key(device->public_key, device->flags & WGDEVICE_HAS_PUBLIC_KEY)); in ugly_print()
318 printf("%s\t", key(peer->public_key)); in ugly_print()
328 printf("%s\t", key(peer->public_key)); in ugly_print()
339 … printf("%s\t%llu\n", key(peer->public_key), (unsigned long long)peer->last_handshake_time.tv_sec); in ugly_print()
345 …printf("%s\t%" PRIu64 "\t%" PRIu64 "\n", key(peer->public_key), (uint64_t)peer->rx_bytes, (uint64_… in ugly_print()
352 printf("%s\t%u\n", key(peer->public_key), peer->persistent_keepalive_interval); in ugly_print()
[all …]
H A Dipc-freebsd.h103 if (binary && size == sizeof(dev->public_key)) { in kernel_get_device()
104 memcpy(dev->public_key, binary, sizeof(dev->public_key)); in kernel_get_device()
131 if (binary && size == sizeof(peer->public_key)) { in kernel_get_device()
132 memcpy(peer->public_key, binary, sizeof(peer->public_key)); in kernel_get_device()
295 nvlist_add_binary(nvl_peers[i], "public-key", peer->public_key, sizeof(peer->public_key)); in kernel_set_device()
H A Dsetconf.c66 pubkeys[i].pubkey = peer->public_key; in sync_conf()
71 pubkeys[i].pubkey = peer->public_key; in sync_conf()
89 memcpy(peer->public_key, pubkeys[i].pubkey, WG_KEY_LEN); in sync_conf()
H A Dcontainers.h52 uint8_t public_key[WG_KEY_LEN]; member
83 uint8_t public_key[WG_KEY_LEN]; member
H A Dipc-uapi.h56 key_to_hex(hex, peer->public_key); in userspace_set_device()
178 curve25519_generate_public(dev->public_key, dev->private_key); in userspace_get_device()
199 if (!key_from_hex(peer->public_key, value)) in userspace_get_device()
H A Dshowconf.c51 key_to_base64(base64, peer->public_key); in showconf_main()
/freebsd/crypto/openssh/regress/misc/sk-dummy/
H A Dsk-dummy.c102 response->public_key = NULL; in pack_key_ecdsa()
129 if ((response->public_key = malloc(response->public_key_len)) == NULL) { in pack_key_ecdsa()
134 response->public_key, response->public_key_len, NULL) == 0) { in pack_key_ecdsa()
157 if (response->public_key != NULL) { in pack_key_ecdsa()
158 memset(response->public_key, 0, in pack_key_ecdsa()
160 free(response->public_key); in pack_key_ecdsa()
161 response->public_key = NULL; in pack_key_ecdsa()
185 response->public_key = NULL; in pack_key_ed25519()
195 if ((response->public_key = malloc(response->public_key_len)) == NULL) { in pack_key_ed25519()
199 memcpy(response->public_key, pk, sizeof(pk)); in pack_key_ed25519()
[all …]
/freebsd/crypto/openssl/crypto/x509/
H A Dx_pubkey.c33 ASN1_BIT_STRING *public_key; member
65 ASN1_SIMPLE(X509_PUBKEY, public_key, ASN1_BIT_STRING)
91 ASN1_BIT_STRING_free(pubkey->public_key); in x509_pubkey_ex_free()
105 && (pubkey->public_key != NULL in x509_pubkey_ex_populate()
106 || (pubkey->public_key = ASN1_BIT_STRING_new()) != NULL); in x509_pubkey_ex_populate()
290 || (pubkey->public_key = ASN1_BIT_STRING_new()) == NULL in X509_PUBKEY_dup()
291 || !ASN1_BIT_STRING_set(pubkey->public_key, in X509_PUBKEY_dup()
292 a->public_key->data, in X509_PUBKEY_dup()
293 a->public_key->length)) { in X509_PUBKEY_dup()
1011 OPENSSL_free(pub->public_key->data); in X509_PUBKEY_set0_param()
[all …]
/freebsd/crypto/openssl/crypto/ec/curve448/
H A Deddsa.c377 size_t message_len, const uint8_t public_key[57], in ossl_ed448_sign()
381 return ossl_c448_ed448_sign(ctx, out_sig, private_key, public_key, message, in ossl_ed448_sign()
388 const uint8_t signature[114], const uint8_t public_key[57], in ossl_ed448_verify()
391 return ossl_c448_ed448_verify(ctx, signature, public_key, message, in ossl_ed448_verify()
398 const uint8_t public_key[57], const uint8_t private_key[57], in ossl_ed448ph_sign()
401 return ossl_c448_ed448_sign_prehash(ctx, out_sig, private_key, public_key, in ossl_ed448ph_sign()
408 const uint8_t signature[114], const uint8_t public_key[57], in ossl_ed448ph_verify()
412 return ossl_c448_ed448_verify_prehash(ctx, signature, public_key, hash, in ossl_ed448ph_verify()
H A Dcurve448_local.h15 const uint8_t public_key[57], const uint8_t private_key[57],
20 const uint8_t signature[114], const uint8_t public_key[57],
/freebsd/crypto/openssl/include/crypto/
H A Decx.h98 const uint8_t public_key[32], const uint8_t private_key[32],
102 const uint8_t signature[64], const uint8_t public_key[32],
110 size_t message_len, const uint8_t public_key[57],
116 const uint8_t signature[114], const uint8_t public_key[57],
/freebsd/crypto/openssh/
H A Dsk-usbhid.c613 response->public_key = NULL; in pack_public_key_ecdsa()
649 if ((response->public_key = malloc(response->public_key_len)) == NULL) { in pack_public_key_ecdsa()
654 response->public_key, response->public_key_len, NULL) == 0) { in pack_public_key_ecdsa()
661 if (ret != 0 && response->public_key != NULL) { in pack_public_key_ecdsa()
662 memset(response->public_key, 0, response->public_key_len); in pack_public_key_ecdsa()
663 free(response->public_key); in pack_public_key_ecdsa()
664 response->public_key = NULL; in pack_public_key_ecdsa()
682 response->public_key = NULL; in pack_public_key_ed25519()
694 if ((response->public_key = malloc(response->public_key_len)) == NULL) { in pack_public_key_ed25519()
698 memcpy(response->public_key, ptr, len); in pack_public_key_ed25519()
[all …]
H A Dkexecdh.c54 const EC_POINT *public_key; in kex_ecdh_keypair() local
67 public_key = EC_KEY_get0_public_key(client_key); in kex_ecdh_keypair()
73 if ((r = sshbuf_put_ec(buf, public_key, group)) != 0 || in kex_ecdh_keypair()
H A Dssh-sk.c187 freezero(r->public_key, r->public_key_len); in sshsk_free_enroll_response()
232 resp->public_key, resp->public_key_len)) != 0) { in sshsk_ecdsa_assemble()
297 memcpy(key->ed25519_pk, resp->public_key, ED25519_PK_SZ); in sshsk_ed25519_assemble()
317 if (resp->public_key == NULL || resp->key_handle == NULL) { in sshsk_key_from_response()
767 freezero(rks[i]->key.public_key, rks[i]->key.public_key_len); in sshsk_free_sk_resident_keys()
H A Dsk-api.h45 uint8_t *public_key; member
H A Dlibcrux_mlkem768_sha3.h9384 Eurydice_slice public_key, in libcrux_ml_kem_serialize_deserialize_ring_elements_reduced_33() argument
9391 i < Eurydice_slice_len(public_key, uint8_t) / in libcrux_ml_kem_serialize_deserialize_ring_elements_reduced_33()
9396 public_key, i0 * LIBCRUX_ML_KEM_CONSTANTS_BYTES_PER_RING_ELEMENT, in libcrux_ml_kem_serialize_deserialize_ring_elements_reduced_33()
10805 static inline void libcrux_ml_kem_ind_cpa_encrypt_60(Eurydice_slice public_key, in libcrux_ml_kem_ind_cpa_encrypt_60() argument
10811 Eurydice_slice_subslice_to(public_key, (size_t)1152U, uint8_t, size_t), in libcrux_ml_kem_ind_cpa_encrypt_60()
10814 Eurydice_slice_subslice_from(public_key, (size_t)1152U, uint8_t, size_t); in libcrux_ml_kem_ind_cpa_encrypt_60()
11085 libcrux_ml_kem_types_MlKemPublicKey_15 *public_key, in libcrux_ml_kem_ind_cca_encapsulate_cd() argument
11099 libcrux_ml_kem_types_as_slice_cb_50(public_key), in libcrux_ml_kem_ind_cca_encapsulate_cd()
11114 (size_t)1184U, libcrux_ml_kem_types_as_slice_cb_50(public_key), uint8_t); in libcrux_ml_kem_ind_cca_encapsulate_cd()
11159 libcrux_ml_kem_types_MlKemPublicKey_15 *public_key, in libcrux_ml_kem_ind_cca_instantiations_portable_encapsulate_c6() argument
[all …]
/freebsd/crypto/openssl/crypto/cms/
H A Dcms_dh.c25 ASN1_INTEGER *public_key = NULL; in dh_cms_set_peerkey() local
50 if ((public_key = d2i_ASN1_INTEGER(NULL, &p, plen)) == NULL) in dh_cms_set_peerkey()
57 if ((bnpub = ASN1_INTEGER_to_BN(public_key, NULL)) == NULL) in dh_cms_set_peerkey()
73 ASN1_INTEGER_free(public_key); in dh_cms_set_peerkey()
/freebsd/crypto/openssl/crypto/dsa/
H A Ddsa_ameth.c37 ASN1_INTEGER *public_key = NULL; in dsa_pub_decode() local
65 if ((public_key = d2i_ASN1_INTEGER(NULL, &p, pklen)) == NULL) { in dsa_pub_decode()
70 if ((dsa->pub_key = ASN1_INTEGER_to_BN(public_key, NULL)) == NULL) { in dsa_pub_decode()
76 ASN1_INTEGER_free(public_key); in dsa_pub_decode()
81 ASN1_INTEGER_free(public_key); in dsa_pub_decode()
/freebsd/crypto/openssl/crypto/dh/
H A Ddh_ameth.c68 ASN1_INTEGER *public_key = NULL; in dh_pub_decode() local
90 if ((public_key = d2i_ASN1_INTEGER(NULL, &p, pklen)) == NULL) { in dh_pub_decode()
96 if ((dh->pub_key = ASN1_INTEGER_to_BN(public_key, NULL)) == NULL) { in dh_pub_decode()
101 ASN1_INTEGER_free(public_key); in dh_pub_decode()
106 ASN1_INTEGER_free(public_key); in dh_pub_decode()
/freebsd/crypto/heimdal/kdc/
H A Dpkinit.c53 BIGNUM *public_key; member
58 EC_KEY *public_key; member
181 if (cp->u.dh.public_key) in _kdc_pk_free_client_param()
182 BN_free(cp->u.dh.public_key); in _kdc_pk_free_client_param()
188 if (cp->u.ecdh.public_key) in _kdc_pk_free_client_param()
189 EC_KEY_free(cp->u.ecdh.public_key); in _kdc_pk_free_client_param()
217 if (client_params->u.dh.public_key == NULL) { in generate_dh_keyblock()
239 dh_gen_keylen = DH_compute_key(dh_gen_key,client_params->u.dh.public_key, client_params->u.dh.key); in generate_dh_keyblock()
255 if (client_params->u.ecdh.public_key == NULL) { in generate_dh_keyblock()
267 EC_KEY_get0_group(client_params->u.ecdh.public_key)); in generate_dh_keyblock()
[all …]
/freebsd/crypto/openssl/doc/man3/
H A DCTLOG_new.pod14 CTLOG *CTLOG_new_ex(EVP_PKEY *public_key, const char *name,
16 CTLOG *CTLOG_new(EVP_PKEY *public_key, const char *name);
/freebsd/contrib/wpa/src/wps/
H A Dwps_attr_parse.h66 const u8 *public_key; member
/freebsd/crypto/openssl/include/openssl/
H A Dct.h.in429 * Creates a new CT log instance with the given |public_key| and |name| and
432 * Takes ownership of |public_key| but copies |name|.
433 * Returns NULL if malloc fails or if |public_key| cannot be converted to DER.
436 CTLOG *CTLOG_new_ex(EVP_PKEY *public_key, const char *name, OSSL_LIB_CTX *libctx,
443 CTLOG *CTLOG_new(EVP_PKEY *public_key, const char *name);
/freebsd/contrib/wpa/src/tls/
H A Dx509v3.h63 u8 *public_key; member

12