Searched refs:public_key_len (Results 1 – 13 of 13) sorted by relevance
/freebsd/crypto/openssh/regress/misc/sk-dummy/ |
H A D | sk-dummy.c | 103 response->public_key_len = 0; in pack_key_ecdsa() 122 response->public_key_len = EC_POINT_point2oct(g, q, in pack_key_ecdsa() 124 if (response->public_key_len == 0 || response->public_key_len > 2048) { in pack_key_ecdsa() 126 response->public_key_len); in pack_key_ecdsa() 129 if ((response->public_key = malloc(response->public_key_len)) == NULL) { in pack_key_ecdsa() 134 response->public_key, response->public_key_len, NULL) == 0) { in pack_key_ecdsa() 159 response->public_key_len); in pack_key_ecdsa() 186 response->public_key_len = 0; in pack_key_ed25519() 194 response->public_key_len = sizeof(pk); in pack_key_ed25519() 195 if ((response->public_key = malloc(response->public_key_len)) == NULL) { in pack_key_ed25519()
|
/freebsd/crypto/openssh/ |
H A D | sk-usbhid.c | 614 response->public_key_len = 0; in pack_public_key_ecdsa() 642 response->public_key_len = EC_POINT_point2oct(g, q, in pack_public_key_ecdsa() 644 if (response->public_key_len == 0 || response->public_key_len > 2048) { in pack_public_key_ecdsa() 646 response->public_key_len); in pack_public_key_ecdsa() 649 if ((response->public_key = malloc(response->public_key_len)) == NULL) { in pack_public_key_ecdsa() 654 response->public_key, response->public_key_len, NULL) == 0) { in pack_public_key_ecdsa() 662 memset(response->public_key, 0, response->public_key_len); in pack_public_key_ecdsa() 683 response->public_key_len = 0; in pack_public_key_ed25519() 693 response->public_key_len = len; in pack_public_key_ed25519() 694 if ((response->public_key = malloc(response->public_key_len)) == NULL) { in pack_public_key_ed25519() [all …]
|
H A D | ssh-sk.c | 187 freezero(r->public_key, r->public_key_len); in sshsk_free_enroll_response() 232 resp->public_key, resp->public_key_len)) != 0) { in sshsk_ecdsa_assemble() 282 if (resp->public_key_len != ED25519_PK_SZ) { in sshsk_ed25519_assemble() 283 error_f("invalid size: %zu", resp->public_key_len); in sshsk_ed25519_assemble() 767 freezero(rks[i]->key.public_key, rks[i]->key.public_key_len); in sshsk_free_sk_resident_keys()
|
H A D | sk-api.h | 46 size_t public_key_len; member
|
/freebsd/contrib/wpa/src/wps/ |
H A D | wps_attr_parse.h | 78 u16 public_key_len; member
|
H A D | wps_attr_parse.c | 511 attr->public_key_len = len; in wps_set_attr()
|
H A D | wps_validate.c | 1306 wps_validate_public_key(attr.public_key, attr.public_key_len, 1) || in wps_validate_m1() 1362 wps_validate_public_key(attr.public_key, attr.public_key_len, 1) || in wps_validate_m2()
|
H A D | wps_enrollee.c | 996 if (wps_process_pubkey(wps, attr->public_key, attr->public_key_len) || in wps_process_m2()
|
H A D | wps_registrar.c | 2658 wps_process_pubkey(wps, attr->public_key, attr->public_key_len) || in wps_process_m1() 2709 len = attr->public_key_len; in wps_process_m1()
|
/freebsd/contrib/wpa/src/tls/ |
H A D | x509v3.h | 64 size_t public_key_len; member
|
H A D | tlsv1_client_ocsp.c | 56 size_t len[1] = { signer->public_key_len }; in ocsp_responder_id_match() 198 issuer->public_key_len, hash); in tls_process_ocsp_single_response()
|
H A D | tlsv1_common.c | 193 *pk = crypto_public_key_import(cert->public_key, cert->public_key_len); in tls_parse_cert()
|
H A D | x509v3.c | 277 cert->public_key_len = hdr.length - 1; in x509_parse_public_key() 279 cert->public_key, cert->public_key_len); in x509_parse_public_key() 1862 issuer->public_key_len); in x509_check_signature()
|