| /src/crypto/external/cpl/trousers/dist/src/include/daa/ |
| key_correct.h | 26 is_pk_correct( TSS_DAA_PK_internal *public_key,
|
| issuer.h | 28 const TSS_DAA_PK_internal *public_key,
|
| /src/crypto/external/bsd/openssl/dist/crypto/ec/curve448/ |
| curve448_local.h | 15 const uint8_t public_key[57], const uint8_t private_key[57], 20 const uint8_t signature[114], const uint8_t public_key[57],
|
| eddsa.c | 377 size_t message_len, const uint8_t public_key[57], 381 return ossl_c448_ed448_sign(ctx, out_sig, private_key, public_key, message, 388 const uint8_t signature[114], const uint8_t public_key[57], 391 return ossl_c448_ed448_verify(ctx, signature, public_key, message, 398 const uint8_t public_key[57], const uint8_t private_key[57], 401 return ossl_c448_ed448_sign_prehash(ctx, out_sig, private_key, public_key, 408 const uint8_t signature[114], const uint8_t public_key[57], 412 return ossl_c448_ed448_verify_prehash(ctx, signature, public_key, hash,
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/ec/curve448/ |
| curve448_local.h | 20 const uint8_t public_key[57], const uint8_t private_key[57], 24 const uint8_t signature[114], const uint8_t public_key[57], 28 const uint8_t public_key[57], const uint8_t private_key[57], 32 const uint8_t public_key[57], const uint8_t *context,
|
| eddsa.c | 339 const uint8_t public_key[57], const uint8_t private_key[57], 342 return c448_ed448_sign(out_sig, private_key, public_key, message, 348 const uint8_t signature[114], const uint8_t public_key[57], 351 return c448_ed448_verify(signature, public_key, message, message_len, 0, 356 const uint8_t public_key[57], const uint8_t private_key[57], 359 return c448_ed448_sign_prehash(out_sig, private_key, public_key, hash, 365 const uint8_t public_key[57], const uint8_t *context, 368 return c448_ed448_verify_prehash(signature, public_key, hash, context,
|
| /src/crypto/external/cpl/trousers/dist/src/tspi/daa/daa_issuer/ |
| key_correctness_proof.c | 164 is_pk_correct( TSS_DAA_PK_internal *public_key, 169 bi_ptr n = public_key->modulus; 204 if( !bi_is_probable_prime( public_key->capitalGamma)) { 206 bi_2_hex_char( public_key->capitalGamma)); 210 if( !bi_is_probable_prime( public_key->rho)) { 212 bi_2_hex_char( public_key->rho)); 217 if( !bi_equals( bi_mod( tmp1, bi_sub( tmp1, public_key->capitalGamma, bi_1), 218 public_key->rho), 225 if ( !bi_equals( bi_mod_exp( tmp1, public_key->gamma, 226 public_key->rho [all...] |
| keypair_generator.c | 96 TSS_DAA_PK_internal *public_key = NULL; local 297 public_key = create_DAA_PK(n, capital_s, capital_z, capital_r0, capital_r1, gamma, 304 TSS_DAA_PK_PROOF_internal *correctness_proof = generate_proof(product_PQprime, public_key, 320 (*key_pair_with_proof)->pk = public_key; 354 if (public_key != NULL) 355 free(public_key);
|
| /src/crypto/external/apache2/openssl/dist/demos/signature/ |
| EVP_DSA_Signature_demo.c | 123 OSSL_PARAM *public_key = NULL; local 125 if (EVP_PKEY_todata(pkey, EVP_PKEY_PUBLIC_KEY, &public_key) != 1) 131 OSSL_PARAM_free(public_key); 132 public_key = NULL; 134 *p_public_key = public_key; 226 OSSL_PARAM public_key[]) 238 if (EVP_PKEY_fromdata(pkey_ctx, &pkey, EVP_PKEY_PUBLIC_KEY, public_key) != 1) 271 OSSL_PARAM *public_key = NULL; local 286 if (extract_public_key(pkey, &public_key) != 1) 297 if (demo_verify(libctx, sig_len, sig_value, public_key) != 1 [all...] |
| /src/external/apache2/mDNSResponder/dist/ServiceRegistration/ |
| verify-macos.c | 52 SecKeyRef public_key = NULL; local 75 public_key = create_public_sec_key(key); 76 require_action_quiet(public_key != NULL, exit, ERROR("Failed to create public_key")); 100 valid = SecKeyVerifySignature(public_key, verify_algorithm, data_to_verify_cfdata, sig_to_match_cfdata, &cf_error); 118 if (public_key != NULL) { 119 CFRelease(public_key); 258 CFDataRef key_data, public_key = NULL; local 266 public_key = CFDataCreateWithBytesNoCopy(NULL, data + 1, 268 if (public_key != NULL) [all...] |
| /src/crypto/external/apache2/openssl/dist/crypto/ct/ |
| ct_log.c | 29 EVP_PKEY *public_key; member in struct:ctlog_st 256 CTLOG *CTLOG_new_ex(EVP_PKEY *public_key, const char *name, OSSL_LIB_CTX *libctx, 275 if (ct_v1_log_id_from_pkey(ret, public_key) != 1) 278 ret->public_key = public_key; 285 CTLOG *CTLOG_new(EVP_PKEY *public_key, const char *name) 287 return CTLOG_new_ex(public_key, name, NULL, NULL); 295 EVP_PKEY_free(log->public_key); 315 return log->public_key;
|
| /src/crypto/external/bsd/openssl/dist/crypto/ct/ |
| ct_log.c | 29 EVP_PKEY *public_key; member in struct:ctlog_st 267 CTLOG *CTLOG_new_ex(EVP_PKEY *public_key, const char *name, OSSL_LIB_CTX *libctx, 292 if (ct_v1_log_id_from_pkey(ret, public_key) != 1) 295 ret->public_key = public_key; 302 CTLOG *CTLOG_new(EVP_PKEY *public_key, const char *name) 304 return CTLOG_new_ex(public_key, name, NULL, NULL); 312 EVP_PKEY_free(log->public_key); 332 return log->public_key;
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/x509/ |
| x_pubkey.c | 22 ASN1_BIT_STRING *public_key; member in struct:X509_pubkey_st 55 ASN1_SIMPLE(X509_PUBKEY, public_key, ASN1_BIT_STRING) 145 if (key == NULL || key->public_key == NULL) 348 OPENSSL_free(pub->public_key->data); 349 pub->public_key->data = penc; 350 pub->public_key->length = penclen; 352 pub->public_key->flags &= ~(ASN1_STRING_FLAG_BITS_LEFT | 0x07); 353 pub->public_key->flags |= ASN1_STRING_FLAG_BITS_LEFT; 365 *pk = pub->public_key->data; 366 *ppklen = pub->public_key->length [all...] |
| /src/crypto/external/bsd/openssl.old/dist/crypto/ct/ |
| ct_log.c | 27 EVP_PKEY *public_key; member in struct:ctlog_st 237 CTLOG *CTLOG_new(EVP_PKEY *public_key, const char *name) 252 if (ct_v1_log_id_from_pkey(public_key, ret->log_id) != 1) 255 ret->public_key = public_key; 267 EVP_PKEY_free(log->public_key); 286 return log->public_key;
|
| /src/crypto/external/apache2/openssl/dist/include/crypto/ |
| ecx.h | 97 const uint8_t public_key[32], const uint8_t private_key[32], 102 const uint8_t signature[64], const uint8_t public_key[32], 111 const uint8_t public_key[57], const uint8_t private_key[57], 117 const uint8_t signature[114], const uint8_t public_key[57],
|
| /src/crypto/external/bsd/openssl/dist/include/crypto/ |
| ecx.h | 98 const uint8_t public_key[32], const uint8_t private_key[32], 102 const uint8_t signature[64], const uint8_t public_key[32], 110 size_t message_len, const uint8_t public_key[57], 116 const uint8_t signature[114], const uint8_t public_key[57],
|
| /src/crypto/external/bsd/openssh/dist/ |
| kexecdh.c | 55 const EC_POINT *public_key; local 68 public_key = EC_KEY_get0_public_key(client_key); 74 if ((r = sshbuf_put_ec(buf, public_key, group)) != 0 ||
|
| sk-api.h | 43 uint8_t *public_key; member in struct:sk_enroll_response
|
| /src/crypto/external/bsd/openssl/dist/crypto/x509/ |
| x_pubkey.c | 33 ASN1_BIT_STRING *public_key; member in struct:X509_pubkey_st 65 ASN1_SIMPLE(X509_PUBKEY, public_key, ASN1_BIT_STRING) 91 ASN1_BIT_STRING_free(pubkey->public_key); 105 && (pubkey->public_key != NULL 106 || (pubkey->public_key = ASN1_BIT_STRING_new()) != NULL); 290 || (pubkey->public_key = ASN1_BIT_STRING_new()) == NULL 291 || !ASN1_BIT_STRING_set(pubkey->public_key, 292 a->public_key->data, 293 a->public_key->length)) { 1011 OPENSSL_free(pub->public_key->data) [all...] |
| /src/crypto/external/apache2/openssl/dist/test/ |
| ml_kem_internal_test.c | 106 ML_KEM_KEY *public_key = NULL; local 123 public_key = ossl_ml_kem_key_new(NULL, NULL, alg[i]); 125 if (private_key == NULL || public_key == NULL 126 || (v = ossl_ml_kem_key_vinfo(public_key)) == NULL) 155 public_key)) 169 public_key)) 235 ossl_ml_kem_key_free(public_key);
|
| /src/crypto/external/apache2/openssl/dist/crypto/x509/ |
| x_pubkey.c | 33 ASN1_BIT_STRING *public_key; member in struct:X509_pubkey_st 65 ASN1_SIMPLE(X509_PUBKEY, public_key, ASN1_BIT_STRING) 91 ASN1_BIT_STRING_free(pubkey->public_key); 105 && (pubkey->public_key != NULL 106 || (pubkey->public_key = ASN1_BIT_STRING_new()) != NULL); 299 || (pubkey->public_key = ASN1_BIT_STRING_new()) == NULL 300 || !ASN1_BIT_STRING_set(pubkey->public_key, 301 a->public_key->data, 302 a->public_key->length)) { 1013 ASN1_STRING_set0(pub->public_key, penc, penclen) [all...] |
| /src/external/apache2/mDNSResponder/dist/mDNSShared/dns_objects/utilities/ |
| rdata_parser.c | 493 uint8_t public_key[0]; // The public key bytes of the DNSKEY record. member in struct:rdata_dnskey_s 500 check_compile_time(offsetof(rdata_dnskey_t, public_key) == 4); 531 return rdata + offsetof(rdata_dnskey_t, public_key); 539 require_return_value(rdata_len >= offsetof(rdata_dnskey_t, public_key), 0); 540 return rdata_len - offsetof(rdata_dnskey_t, public_key); 548 return rdata_len > offsetof(rdata_dnskey_t, public_key);
|
| /src/crypto/external/apache2/openssl/dist/crypto/cms/ |
| cms_dh.c | 26 ASN1_INTEGER *public_key = NULL; local 51 if ((public_key = d2i_ASN1_INTEGER(NULL, &p, plen)) == NULL) 58 if ((bnpub = ASN1_INTEGER_to_BN(public_key, NULL)) == NULL) 74 ASN1_INTEGER_free(public_key);
|
| /src/crypto/external/bsd/openssl/dist/crypto/cms/ |
| cms_dh.c | 25 ASN1_INTEGER *public_key = NULL; local 50 if ((public_key = d2i_ASN1_INTEGER(NULL, &p, plen)) == NULL) 57 if ((bnpub = ASN1_INTEGER_to_BN(public_key, NULL)) == NULL) 73 ASN1_INTEGER_free(public_key);
|
| /src/external/bsd/wpa/dist/src/wps/ |
| wps_attr_parse.h | 66 const u8 *public_key; member in struct:wps_parse_attr
|