HomeSort by: relevance | last modified time | path
    Searched refs:public_key (Results 1 - 25 of 65) sorted by relevancy

1 2 3

  /src/crypto/external/cpl/trousers/dist/src/include/daa/
key_correct.h 26 is_pk_correct( TSS_DAA_PK_internal *public_key,
issuer.h 28 const TSS_DAA_PK_internal *public_key,
  /src/crypto/external/bsd/openssl/dist/crypto/ec/curve448/
curve448_local.h 15 const uint8_t public_key[57], const uint8_t private_key[57],
20 const uint8_t signature[114], const uint8_t public_key[57],
eddsa.c 377 size_t message_len, const uint8_t public_key[57],
381 return ossl_c448_ed448_sign(ctx, out_sig, private_key, public_key, message,
388 const uint8_t signature[114], const uint8_t public_key[57],
391 return ossl_c448_ed448_verify(ctx, signature, public_key, message,
398 const uint8_t public_key[57], const uint8_t private_key[57],
401 return ossl_c448_ed448_sign_prehash(ctx, out_sig, private_key, public_key,
408 const uint8_t signature[114], const uint8_t public_key[57],
412 return ossl_c448_ed448_verify_prehash(ctx, signature, public_key, hash,
  /src/crypto/external/bsd/openssl.old/dist/crypto/ec/curve448/
curve448_local.h 20 const uint8_t public_key[57], const uint8_t private_key[57],
24 const uint8_t signature[114], const uint8_t public_key[57],
28 const uint8_t public_key[57], const uint8_t private_key[57],
32 const uint8_t public_key[57], const uint8_t *context,
eddsa.c 339 const uint8_t public_key[57], const uint8_t private_key[57],
342 return c448_ed448_sign(out_sig, private_key, public_key, message,
348 const uint8_t signature[114], const uint8_t public_key[57],
351 return c448_ed448_verify(signature, public_key, message, message_len, 0,
356 const uint8_t public_key[57], const uint8_t private_key[57],
359 return c448_ed448_sign_prehash(out_sig, private_key, public_key, hash,
365 const uint8_t public_key[57], const uint8_t *context,
368 return c448_ed448_verify_prehash(signature, public_key, hash, context,
  /src/crypto/external/cpl/trousers/dist/src/tspi/daa/daa_issuer/
key_correctness_proof.c 164 is_pk_correct( TSS_DAA_PK_internal *public_key,
169 bi_ptr n = public_key->modulus;
204 if( !bi_is_probable_prime( public_key->capitalGamma)) {
206 bi_2_hex_char( public_key->capitalGamma));
210 if( !bi_is_probable_prime( public_key->rho)) {
212 bi_2_hex_char( public_key->rho));
217 if( !bi_equals( bi_mod( tmp1, bi_sub( tmp1, public_key->capitalGamma, bi_1),
218 public_key->rho),
225 if ( !bi_equals( bi_mod_exp( tmp1, public_key->gamma,
226 public_key->rho
    [all...]
keypair_generator.c 96 TSS_DAA_PK_internal *public_key = NULL; local
297 public_key = create_DAA_PK(n, capital_s, capital_z, capital_r0, capital_r1, gamma,
304 TSS_DAA_PK_PROOF_internal *correctness_proof = generate_proof(product_PQprime, public_key,
320 (*key_pair_with_proof)->pk = public_key;
354 if (public_key != NULL)
355 free(public_key);
  /src/crypto/external/apache2/openssl/dist/demos/signature/
EVP_DSA_Signature_demo.c 123 OSSL_PARAM *public_key = NULL; local
125 if (EVP_PKEY_todata(pkey, EVP_PKEY_PUBLIC_KEY, &public_key) != 1)
131 OSSL_PARAM_free(public_key);
132 public_key = NULL;
134 *p_public_key = public_key;
226 OSSL_PARAM public_key[])
238 if (EVP_PKEY_fromdata(pkey_ctx, &pkey, EVP_PKEY_PUBLIC_KEY, public_key) != 1)
271 OSSL_PARAM *public_key = NULL; local
286 if (extract_public_key(pkey, &public_key) != 1)
297 if (demo_verify(libctx, sig_len, sig_value, public_key) != 1
    [all...]
  /src/external/apache2/mDNSResponder/dist/ServiceRegistration/
verify-macos.c 52 SecKeyRef public_key = NULL; local
75 public_key = create_public_sec_key(key);
76 require_action_quiet(public_key != NULL, exit, ERROR("Failed to create public_key"));
100 valid = SecKeyVerifySignature(public_key, verify_algorithm, data_to_verify_cfdata, sig_to_match_cfdata, &cf_error);
118 if (public_key != NULL) {
119 CFRelease(public_key);
258 CFDataRef key_data, public_key = NULL; local
266 public_key = CFDataCreateWithBytesNoCopy(NULL, data + 1,
268 if (public_key != NULL)
    [all...]
  /src/crypto/external/apache2/openssl/dist/crypto/ct/
ct_log.c 29 EVP_PKEY *public_key; member in struct:ctlog_st
256 CTLOG *CTLOG_new_ex(EVP_PKEY *public_key, const char *name, OSSL_LIB_CTX *libctx,
275 if (ct_v1_log_id_from_pkey(ret, public_key) != 1)
278 ret->public_key = public_key;
285 CTLOG *CTLOG_new(EVP_PKEY *public_key, const char *name)
287 return CTLOG_new_ex(public_key, name, NULL, NULL);
295 EVP_PKEY_free(log->public_key);
315 return log->public_key;
  /src/crypto/external/bsd/openssl/dist/crypto/ct/
ct_log.c 29 EVP_PKEY *public_key; member in struct:ctlog_st
267 CTLOG *CTLOG_new_ex(EVP_PKEY *public_key, const char *name, OSSL_LIB_CTX *libctx,
292 if (ct_v1_log_id_from_pkey(ret, public_key) != 1)
295 ret->public_key = public_key;
302 CTLOG *CTLOG_new(EVP_PKEY *public_key, const char *name)
304 return CTLOG_new_ex(public_key, name, NULL, NULL);
312 EVP_PKEY_free(log->public_key);
332 return log->public_key;
  /src/crypto/external/bsd/openssl.old/dist/crypto/x509/
x_pubkey.c 22 ASN1_BIT_STRING *public_key; member in struct:X509_pubkey_st
55 ASN1_SIMPLE(X509_PUBKEY, public_key, ASN1_BIT_STRING)
145 if (key == NULL || key->public_key == NULL)
348 OPENSSL_free(pub->public_key->data);
349 pub->public_key->data = penc;
350 pub->public_key->length = penclen;
352 pub->public_key->flags &= ~(ASN1_STRING_FLAG_BITS_LEFT | 0x07);
353 pub->public_key->flags |= ASN1_STRING_FLAG_BITS_LEFT;
365 *pk = pub->public_key->data;
366 *ppklen = pub->public_key->length
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/crypto/ct/
ct_log.c 27 EVP_PKEY *public_key; member in struct:ctlog_st
237 CTLOG *CTLOG_new(EVP_PKEY *public_key, const char *name)
252 if (ct_v1_log_id_from_pkey(public_key, ret->log_id) != 1)
255 ret->public_key = public_key;
267 EVP_PKEY_free(log->public_key);
286 return log->public_key;
  /src/crypto/external/apache2/openssl/dist/include/crypto/
ecx.h 97 const uint8_t public_key[32], const uint8_t private_key[32],
102 const uint8_t signature[64], const uint8_t public_key[32],
111 const uint8_t public_key[57], const uint8_t private_key[57],
117 const uint8_t signature[114], const uint8_t public_key[57],
  /src/crypto/external/bsd/openssl/dist/include/crypto/
ecx.h 98 const uint8_t public_key[32], const uint8_t private_key[32],
102 const uint8_t signature[64], const uint8_t public_key[32],
110 size_t message_len, const uint8_t public_key[57],
116 const uint8_t signature[114], const uint8_t public_key[57],
  /src/crypto/external/bsd/openssh/dist/
kexecdh.c 55 const EC_POINT *public_key; local
68 public_key = EC_KEY_get0_public_key(client_key);
74 if ((r = sshbuf_put_ec(buf, public_key, group)) != 0 ||
sk-api.h 43 uint8_t *public_key; member in struct:sk_enroll_response
  /src/crypto/external/bsd/openssl/dist/crypto/x509/
x_pubkey.c 33 ASN1_BIT_STRING *public_key; member in struct:X509_pubkey_st
65 ASN1_SIMPLE(X509_PUBKEY, public_key, ASN1_BIT_STRING)
91 ASN1_BIT_STRING_free(pubkey->public_key);
105 && (pubkey->public_key != NULL
106 || (pubkey->public_key = ASN1_BIT_STRING_new()) != NULL);
290 || (pubkey->public_key = ASN1_BIT_STRING_new()) == NULL
291 || !ASN1_BIT_STRING_set(pubkey->public_key,
292 a->public_key->data,
293 a->public_key->length)) {
1011 OPENSSL_free(pub->public_key->data)
    [all...]
  /src/crypto/external/apache2/openssl/dist/test/
ml_kem_internal_test.c 106 ML_KEM_KEY *public_key = NULL; local
123 public_key = ossl_ml_kem_key_new(NULL, NULL, alg[i]);
125 if (private_key == NULL || public_key == NULL
126 || (v = ossl_ml_kem_key_vinfo(public_key)) == NULL)
155 public_key))
169 public_key))
235 ossl_ml_kem_key_free(public_key);
  /src/crypto/external/apache2/openssl/dist/crypto/x509/
x_pubkey.c 33 ASN1_BIT_STRING *public_key; member in struct:X509_pubkey_st
65 ASN1_SIMPLE(X509_PUBKEY, public_key, ASN1_BIT_STRING)
91 ASN1_BIT_STRING_free(pubkey->public_key);
105 && (pubkey->public_key != NULL
106 || (pubkey->public_key = ASN1_BIT_STRING_new()) != NULL);
299 || (pubkey->public_key = ASN1_BIT_STRING_new()) == NULL
300 || !ASN1_BIT_STRING_set(pubkey->public_key,
301 a->public_key->data,
302 a->public_key->length)) {
1013 ASN1_STRING_set0(pub->public_key, penc, penclen)
    [all...]
  /src/external/apache2/mDNSResponder/dist/mDNSShared/dns_objects/utilities/
rdata_parser.c 493 uint8_t public_key[0]; // The public key bytes of the DNSKEY record. member in struct:rdata_dnskey_s
500 check_compile_time(offsetof(rdata_dnskey_t, public_key) == 4);
531 return rdata + offsetof(rdata_dnskey_t, public_key);
539 require_return_value(rdata_len >= offsetof(rdata_dnskey_t, public_key), 0);
540 return rdata_len - offsetof(rdata_dnskey_t, public_key);
548 return rdata_len > offsetof(rdata_dnskey_t, public_key);
  /src/crypto/external/apache2/openssl/dist/crypto/cms/
cms_dh.c 26 ASN1_INTEGER *public_key = NULL; local
51 if ((public_key = d2i_ASN1_INTEGER(NULL, &p, plen)) == NULL)
58 if ((bnpub = ASN1_INTEGER_to_BN(public_key, NULL)) == NULL)
74 ASN1_INTEGER_free(public_key);
  /src/crypto/external/bsd/openssl/dist/crypto/cms/
cms_dh.c 25 ASN1_INTEGER *public_key = NULL; local
50 if ((public_key = d2i_ASN1_INTEGER(NULL, &p, plen)) == NULL)
57 if ((bnpub = ASN1_INTEGER_to_BN(public_key, NULL)) == NULL)
73 ASN1_INTEGER_free(public_key);
  /src/external/bsd/wpa/dist/src/wps/
wps_attr_parse.h 66 const u8 *public_key; member in struct:wps_parse_attr

Completed in 46 milliseconds

1 2 3