HomeSort by: relevance | last modified time | path
    Searched refs:keypair (Results 1 - 25 of 26) sorted by relevancy

1 2

  /src/crypto/external/bsd/openssh/dist/
mlkem768.sh 100 struct libcrux_mlkem768_keypair keypair = {0};
108 if (sizeof(keypair.pk.value) != crypto_kem_mlkem768_PUBLICKEYBYTES)
109 errx(1, "keypair.pk bad");
110 if (sizeof(keypair.sk.value) != crypto_kem_mlkem768_SECRETKEYBYTES)
111 errx(1, "keypair.sk bad");
123 keypair = libcrux_ml_kem_mlkem768_portable_generate_key_pair(kp_seed);
124 if (!libcrux_ml_kem_mlkem768_portable_validate_public_key(&keypair.pk))
126 enc_result = libcrux_ml_kem_mlkem768_portable_encapsulate(&keypair.pk,
128 libcrux_ml_kem_mlkem768_portable_decapsulate(&keypair.sk,
kexmlkem768x25519.c 55 struct libcrux_mlkem768_keypair keypair; local
63 keypair = libcrux_ml_kem_mlkem768_portable_generate_key_pair(rnd);
64 memcpy(cp, keypair.pk.value, crypto_kem_mlkem768_PUBLICKEYBYTES);
65 memcpy(kex->mlkem768_client_key, keypair.sk.value,
81 explicit_bzero(&keypair, sizeof(keypair));
ed25519.sh 14 supercop-20221122/crypto_sign/ed25519/ref/keypair.c
68 */crypto_sign/ed25519/ref/keypair.c)
  /src/crypto/external/apache2/openssl/dist/demos/signature/
EVP_DSA_Signature_demo.c 12 * methods to calculate public/private DSA keypair and to sign and verify
143 OSSL_PARAM *keypair = NULL; local
145 if (EVP_PKEY_todata(pkey, EVP_PKEY_KEYPAIR, &keypair) != 1)
151 OSSL_PARAM_free(keypair);
152 keypair = NULL;
154 *p_keypair = keypair;
161 OSSL_PARAM keypair[])
175 if (EVP_PKEY_fromdata(pkey_ctx, &pkey, EVP_PKEY_KEYPAIR, keypair) != 1)
272 OSSL_PARAM *keypair = NULL; local
289 if (extract_keypair(pkey, &keypair) != 1
    [all...]
  /src/external/bsd/unbound/dist/dnscrypt/testdata/
gencert.sh 17 dnscrypt-wrapper --gen-crypt-keypair \
  /src/crypto/external/apache2/openssl/dist/test/recipes/30-test_evp_data/
evppkey_mismatch.txt 15 # Public / Private keys from other tests used for keypair testing.
59 Title = Test keypair mismatches
evppkey_mismatch_ecx.txt 15 # Public / Private keys from other tests used for keypair testing.
70 Title = Test keypair mismatches
evppkey_dsa.txt 98 Title = Test keypair mismatches
evppkey_dsa_sigalg.txt 99 Title = Test keypair mismatches
evppkey_ecx.txt 601 Title = Test keypair mismatches
evppkey_rsa_common.txt 1839 Title = Test RSA keypair mismatches
  /src/external/bsd/unbound/dist/dnscrypt/
dnscrypt.h 47 } KeyPair;
52 KeyPair *keypair; member in struct:cert_
63 KeyPair *keypairs;
dnscrypt.c 300 cert->keypair->crypt_secretkey);
313 cert->keypair->crypt_secretkey) != 0) {
322 cert->keypair->crypt_secretkey) != 0) {
491 cert->keypair->crypt_secretkey);
813 KeyPair *current_keypair = &env->keypairs[keypair_id];
835 current_cert->keypair = current_keypair;
844 current_cert->keypair->crypt_publickey);
  /src/crypto/external/bsd/openssl/dist/test/recipes/30-test_evp_data/
evppkey_mismatch.txt 15 # Public / Private keys from other tests used for keypair testing.
70 Title = Test keypair mismatches
evppkey_dsa.txt 98 Title = Test keypair mismatches
evppkey_ecx.txt 570 Title = Test keypair mismatches
evppkey_rsa_common.txt 1251 Title = Test RSA keypair mismatches
  /src/crypto/external/bsd/netpgp/dist/src/lib/
netpgp.c 1398 const pgp_key_t *keypair; local
1416 if ((keypair = resolve_userid(netpgp, netpgp->secring, userid)) == NULL) {
1433 pgp_print_keydata(io, netpgp->pubring, keypair, "signature ",
1434 &keypair->key.seckey.pubkey, 0);
1442 seckey = pgp_decrypt_seckey(keypair, netpgp->passfp);
1528 const pgp_key_t *keypair; local
1545 if ((keypair = resolve_userid(netpgp, netpgp->secring, userid)) == NULL) {
1562 pgp_print_keydata(io, netpgp->pubring, keypair, "signature ",
1563 &keypair->key.seckey.pubkey, 0);
1571 seckey = pgp_decrypt_seckey(keypair, netpgp->passfp)
1673 const pgp_key_t *keypair; local
    [all...]
openssl_crypto.c 797 RSA *keypair = makeRSA(pubkey, seckey); local
801 if (RSA_check_key(keypair) != 1) {
807 n = RSA_private_decrypt((int)length, in, out, keypair, RSA_NO_PADDING);
820 RSA_free(keypair);
889 \brief Generates an RSA keypair
1003 \brief Creates a self-signed RSA keypair
1007 \return The new keypair or NULL
reader.c 2218 const pgp_key_t *keypair; local
2244 keypair = cbinfo->cryptinfo.keydata;
2246 pubkey = keypair;
2255 secret = pgp_decrypt_seckey(keypair, cbinfo->passfp);
  /src/crypto/external/apache2/openssl/dist/demos/pkey/
dsa.inc 111 static int dsa_print_key(const EVP_PKEY *pkey, int keypair,
143 if (keypair) {
  /src/crypto/external/bsd/openssl/dist/demos/pkey/
dsa.inc 111 static int dsa_print_key(const EVP_PKEY *pkey, int keypair,
143 if (keypair) {
  /src/crypto/external/bsd/openssl.old/dist/test/
evp_extra_test.c 961 EVP_PKEY *keypair = NULL; local
969 if (!TEST_ptr(keypair = load_example_rsa_key())
970 || !TEST_ptr(kek = OPENSSL_zalloc(EVP_PKEY_size(keypair)))
973 &keypair, 1))
982 if (!TEST_true(EVP_OpenInit(ctx, type, kek, kek_len, iv, keypair))
995 EVP_PKEY_free(keypair);
  /src/crypto/external/bsd/openssl/dist/test/
evp_extra_test.c 1294 EVP_PKEY *keypair = NULL; local
1311 if (!TEST_ptr(keypair = load_example_rsa_key())
1312 || !TEST_ptr(kek = OPENSSL_zalloc(EVP_PKEY_get_size(keypair)))
1315 &keypair, 1))
1324 if (!TEST_true(EVP_OpenInit(ctx, type, kek, kek_len, iv, keypair))
1339 EVP_PKEY_free(keypair);
  /src/crypto/external/apache2/openssl/dist/test/
evp_extra_test.c 1418 EVP_PKEY *keypair = NULL; local
1439 || !TEST_ptr(keypair = make_key_fromdata("EC", params)))
1442 if (!test_selection(keypair, EVP_PKEY_KEYPAIR))
1445 if (!EVP_PKEY_get_bn_param(keypair, OSSL_PKEY_PARAM_EC_PUB_X, &x)
1446 || !EVP_PKEY_get_bn_param(keypair, OSSL_PKEY_PARAM_EC_PUB_Y, &y))
1463 EVP_PKEY_free(keypair);
1765 EVP_PKEY *keypair = NULL; local
1782 if (!TEST_ptr(keypair = load_example_rsa_key())
1783 || !TEST_ptr(kek = OPENSSL_zalloc(EVP_PKEY_get_size(keypair)))
1786 &keypair, 1)
    [all...]

Completed in 145 milliseconds

1 2