| /src/crypto/external/bsd/openssh/dist/ |
| mlkem768.sh | 100 struct libcrux_mlkem768_keypair keypair = {0}; 108 if (sizeof(keypair.pk.value) != crypto_kem_mlkem768_PUBLICKEYBYTES) 109 errx(1, "keypair.pk bad"); 110 if (sizeof(keypair.sk.value) != crypto_kem_mlkem768_SECRETKEYBYTES) 111 errx(1, "keypair.sk bad"); 123 keypair = libcrux_ml_kem_mlkem768_portable_generate_key_pair(kp_seed); 124 if (!libcrux_ml_kem_mlkem768_portable_validate_public_key(&keypair.pk)) 126 enc_result = libcrux_ml_kem_mlkem768_portable_encapsulate(&keypair.pk, 128 libcrux_ml_kem_mlkem768_portable_decapsulate(&keypair.sk,
|
| kexmlkem768x25519.c | 55 struct libcrux_mlkem768_keypair keypair; local 63 keypair = libcrux_ml_kem_mlkem768_portable_generate_key_pair(rnd); 64 memcpy(cp, keypair.pk.value, crypto_kem_mlkem768_PUBLICKEYBYTES); 65 memcpy(kex->mlkem768_client_key, keypair.sk.value, 81 explicit_bzero(&keypair, sizeof(keypair));
|
| ed25519.sh | 14 supercop-20221122/crypto_sign/ed25519/ref/keypair.c 68 */crypto_sign/ed25519/ref/keypair.c)
|
| /src/crypto/external/apache2/openssl/dist/demos/signature/ |
| EVP_DSA_Signature_demo.c | 12 * methods to calculate public/private DSA keypair and to sign and verify 143 OSSL_PARAM *keypair = NULL; local 145 if (EVP_PKEY_todata(pkey, EVP_PKEY_KEYPAIR, &keypair) != 1) 151 OSSL_PARAM_free(keypair); 152 keypair = NULL; 154 *p_keypair = keypair; 161 OSSL_PARAM keypair[]) 175 if (EVP_PKEY_fromdata(pkey_ctx, &pkey, EVP_PKEY_KEYPAIR, keypair) != 1) 272 OSSL_PARAM *keypair = NULL; local 289 if (extract_keypair(pkey, &keypair) != 1 [all...] |
| /src/external/bsd/unbound/dist/dnscrypt/testdata/ |
| gencert.sh | 17 dnscrypt-wrapper --gen-crypt-keypair \
|
| /src/crypto/external/apache2/openssl/dist/test/recipes/30-test_evp_data/ |
| evppkey_mismatch.txt | 15 # Public / Private keys from other tests used for keypair testing. 59 Title = Test keypair mismatches
|
| evppkey_mismatch_ecx.txt | 15 # Public / Private keys from other tests used for keypair testing. 70 Title = Test keypair mismatches
|
| evppkey_dsa.txt | 98 Title = Test keypair mismatches
|
| evppkey_dsa_sigalg.txt | 99 Title = Test keypair mismatches
|
| evppkey_ecx.txt | 601 Title = Test keypair mismatches
|
| evppkey_rsa_common.txt | 1839 Title = Test RSA keypair mismatches
|
| /src/external/bsd/unbound/dist/dnscrypt/ |
| dnscrypt.h | 47 } KeyPair; 52 KeyPair *keypair; member in struct:cert_ 63 KeyPair *keypairs;
|
| dnscrypt.c | 300 cert->keypair->crypt_secretkey); 313 cert->keypair->crypt_secretkey) != 0) { 322 cert->keypair->crypt_secretkey) != 0) { 491 cert->keypair->crypt_secretkey); 813 KeyPair *current_keypair = &env->keypairs[keypair_id]; 835 current_cert->keypair = current_keypair; 844 current_cert->keypair->crypt_publickey);
|
| /src/crypto/external/bsd/openssl/dist/test/recipes/30-test_evp_data/ |
| evppkey_mismatch.txt | 15 # Public / Private keys from other tests used for keypair testing. 70 Title = Test keypair mismatches
|
| evppkey_dsa.txt | 98 Title = Test keypair mismatches
|
| evppkey_ecx.txt | 570 Title = Test keypair mismatches
|
| evppkey_rsa_common.txt | 1251 Title = Test RSA keypair mismatches
|
| /src/crypto/external/bsd/netpgp/dist/src/lib/ |
| netpgp.c | 1398 const pgp_key_t *keypair; local 1416 if ((keypair = resolve_userid(netpgp, netpgp->secring, userid)) == NULL) { 1433 pgp_print_keydata(io, netpgp->pubring, keypair, "signature ", 1434 &keypair->key.seckey.pubkey, 0); 1442 seckey = pgp_decrypt_seckey(keypair, netpgp->passfp); 1528 const pgp_key_t *keypair; local 1545 if ((keypair = resolve_userid(netpgp, netpgp->secring, userid)) == NULL) { 1562 pgp_print_keydata(io, netpgp->pubring, keypair, "signature ", 1563 &keypair->key.seckey.pubkey, 0); 1571 seckey = pgp_decrypt_seckey(keypair, netpgp->passfp) 1673 const pgp_key_t *keypair; local [all...] |
| openssl_crypto.c | 797 RSA *keypair = makeRSA(pubkey, seckey); local 801 if (RSA_check_key(keypair) != 1) { 807 n = RSA_private_decrypt((int)length, in, out, keypair, RSA_NO_PADDING); 820 RSA_free(keypair); 889 \brief Generates an RSA keypair 1003 \brief Creates a self-signed RSA keypair 1007 \return The new keypair or NULL
|
| reader.c | 2218 const pgp_key_t *keypair; local 2244 keypair = cbinfo->cryptinfo.keydata; 2246 pubkey = keypair; 2255 secret = pgp_decrypt_seckey(keypair, cbinfo->passfp);
|
| /src/crypto/external/apache2/openssl/dist/demos/pkey/ |
| dsa.inc | 111 static int dsa_print_key(const EVP_PKEY *pkey, int keypair, 143 if (keypair) {
|
| /src/crypto/external/bsd/openssl/dist/demos/pkey/ |
| dsa.inc | 111 static int dsa_print_key(const EVP_PKEY *pkey, int keypair, 143 if (keypair) {
|
| /src/crypto/external/bsd/openssl.old/dist/test/ |
| evp_extra_test.c | 961 EVP_PKEY *keypair = NULL; local 969 if (!TEST_ptr(keypair = load_example_rsa_key()) 970 || !TEST_ptr(kek = OPENSSL_zalloc(EVP_PKEY_size(keypair))) 973 &keypair, 1)) 982 if (!TEST_true(EVP_OpenInit(ctx, type, kek, kek_len, iv, keypair)) 995 EVP_PKEY_free(keypair);
|
| /src/crypto/external/bsd/openssl/dist/test/ |
| evp_extra_test.c | 1294 EVP_PKEY *keypair = NULL; local 1311 if (!TEST_ptr(keypair = load_example_rsa_key()) 1312 || !TEST_ptr(kek = OPENSSL_zalloc(EVP_PKEY_get_size(keypair))) 1315 &keypair, 1)) 1324 if (!TEST_true(EVP_OpenInit(ctx, type, kek, kek_len, iv, keypair)) 1339 EVP_PKEY_free(keypair);
|
| /src/crypto/external/apache2/openssl/dist/test/ |
| evp_extra_test.c | 1418 EVP_PKEY *keypair = NULL; local 1439 || !TEST_ptr(keypair = make_key_fromdata("EC", params))) 1442 if (!test_selection(keypair, EVP_PKEY_KEYPAIR)) 1445 if (!EVP_PKEY_get_bn_param(keypair, OSSL_PKEY_PARAM_EC_PUB_X, &x) 1446 || !EVP_PKEY_get_bn_param(keypair, OSSL_PKEY_PARAM_EC_PUB_Y, &y)) 1463 EVP_PKEY_free(keypair); 1765 EVP_PKEY *keypair = NULL; local 1782 if (!TEST_ptr(keypair = load_example_rsa_key()) 1783 || !TEST_ptr(kek = OPENSSL_zalloc(EVP_PKEY_get_size(keypair))) 1786 &keypair, 1) [all...] |