/dports/multimedia/gstreamer1-plugins-rust/gst-plugins-rs-d0466b3eee114207f851b37cae0015c0e718f021/cargo-crates/sodiumoxide-0.2.7/src/crypto/kx/ |
H A D | x25519blake2b.rs | 78 client_pk: &PublicKey, in server_session_keys() 88 client_pk.0.as_ptr(), in server_session_keys() 103 client_pk: &PublicKey, in client_session_keys() 113 client_pk.0.as_ptr(), in client_session_keys() 132 let (client_pk, client_sk) = gen_keypair(); in test_kx() 135 assert!(client_pk != server_pk); in test_kx() 149 let (client_pk, client_sk) = gen_keypair(); in test_kx_non_acceptable_keys() 179 assert_eq!(client_pk, client_pk_expected); in test_vectors() 202 client_pk.0[0] += 1; in test_vectors() 210 let (client_pk, _) = gen_keypair(); in test_vectors() [all …]
|
/dports/multimedia/gstreamer1-plugins-rust/gst-plugins-rs-d0466b3eee114207f851b37cae0015c0e718f021/cargo-crates/libsodium-sys-0.2.7/libsodium/test/default/ |
H A D | kx.c | 15 unsigned char *client_pk, *client_sk; in tv_kx() local 26 client_pk = (unsigned char *) sodium_malloc(crypto_kx_PUBLICKEYBYTES); in tv_kx() 28 crypto_kx_seed_keypair(client_pk, client_sk, seed); in tv_kx() 30 sodium_bin2hex(hex, sizeof hex, client_pk, crypto_kx_PUBLICKEYBYTES); in tv_kx() 43 client_pk, client_sk, in tv_kx() 46 client_pk, client_sk, server_pk) != 0) { in tv_kx() 57 server_pk, server_sk, client_pk) != 0) { in tv_kx() 65 sodium_increment(client_pk, crypto_kx_PUBLICKEYBYTES); in tv_kx() 75 crypto_kx_keypair(client_pk, client_sk); in tv_kx() 85 crypto_kx_seed_keypair(client_pk, client_sk, seed); in tv_kx() [all …]
|
/dports/security/libsodium/libsodium-1.0.18/test/default/ |
H A D | kx.c | 15 unsigned char *client_pk, *client_sk; in tv_kx() local 26 client_pk = (unsigned char *) sodium_malloc(crypto_kx_PUBLICKEYBYTES); in tv_kx() 28 crypto_kx_seed_keypair(client_pk, client_sk, seed); in tv_kx() 30 sodium_bin2hex(hex, sizeof hex, client_pk, crypto_kx_PUBLICKEYBYTES); in tv_kx() 43 client_pk, client_sk, in tv_kx() 46 client_pk, client_sk, server_pk) != 0) { in tv_kx() 57 server_pk, server_sk, client_pk) != 0) { in tv_kx() 65 sodium_increment(client_pk, crypto_kx_PUBLICKEYBYTES); in tv_kx() 75 crypto_kx_keypair(client_pk, client_sk); in tv_kx() 85 crypto_kx_seed_keypair(client_pk, client_sk, seed); in tv_kx() [all …]
|
/dports/security/py-pynacl/PyNaCl-1.4.0/src/libsodium/test/default/ |
H A D | kx.c | 15 unsigned char *client_pk, *client_sk; in tv_kx() local 26 client_pk = (unsigned char *) sodium_malloc(crypto_kx_PUBLICKEYBYTES); in tv_kx() 28 crypto_kx_seed_keypair(client_pk, client_sk, seed); in tv_kx() 30 sodium_bin2hex(hex, sizeof hex, client_pk, crypto_kx_PUBLICKEYBYTES); in tv_kx() 43 client_pk, client_sk, in tv_kx() 46 client_pk, client_sk, server_pk) != 0) { in tv_kx() 57 server_pk, server_sk, client_pk) != 0) { in tv_kx() 65 sodium_increment(client_pk, crypto_kx_PUBLICKEYBYTES); in tv_kx() 75 crypto_kx_keypair(client_pk, client_sk); in tv_kx() 85 crypto_kx_seed_keypair(client_pk, client_sk, seed); in tv_kx() [all …]
|
/dports/devel/pijul/pijul-1.0.0.a55/cargo-crates/libsodium-sys-0.2.7/libsodium/test/default/ |
H A D | kx.c | 15 unsigned char *client_pk, *client_sk; in tv_kx() local 26 client_pk = (unsigned char *) sodium_malloc(crypto_kx_PUBLICKEYBYTES); in tv_kx() 28 crypto_kx_seed_keypair(client_pk, client_sk, seed); in tv_kx() 30 sodium_bin2hex(hex, sizeof hex, client_pk, crypto_kx_PUBLICKEYBYTES); in tv_kx() 43 client_pk, client_sk, in tv_kx() 46 client_pk, client_sk, server_pk) != 0) { in tv_kx() 57 server_pk, server_sk, client_pk) != 0) { in tv_kx() 65 sodium_increment(client_pk, crypto_kx_PUBLICKEYBYTES); in tv_kx() 75 crypto_kx_keypair(client_pk, client_sk); in tv_kx() 85 crypto_kx_seed_keypair(client_pk, client_sk, seed); in tv_kx() [all …]
|
/dports/security/libsodium/libsodium-1.0.18/src/libsodium/crypto_kx/ |
H A D | crypto_kx.c | 36 const unsigned char client_pk[crypto_kx_PUBLICKEYBYTES], in crypto_kx_client_session_keys() 61 crypto_generichash_update(&h, client_pk, crypto_kx_PUBLICKEYBYTES); in crypto_kx_client_session_keys() 79 const unsigned char client_pk[crypto_kx_PUBLICKEYBYTES]) in crypto_kx_server_session_keys() 95 if (crypto_scalarmult(q, server_sk, client_pk) != 0) { in crypto_kx_server_session_keys() 102 crypto_generichash_update(&h, client_pk, crypto_kx_PUBLICKEYBYTES); in crypto_kx_server_session_keys()
|
/dports/security/py-pynacl/PyNaCl-1.4.0/src/libsodium/src/libsodium/crypto_kx/ |
H A D | crypto_kx.c | 36 const unsigned char client_pk[crypto_kx_PUBLICKEYBYTES], 61 crypto_generichash_update(&h, client_pk, crypto_kx_PUBLICKEYBYTES); 79 const unsigned char client_pk[crypto_kx_PUBLICKEYBYTES]) 95 if (crypto_scalarmult(q, server_sk, client_pk) != 0) { 102 crypto_generichash_update(&h, client_pk, crypto_kx_PUBLICKEYBYTES);
|
/dports/devel/pijul/pijul-1.0.0.a55/cargo-crates/libsodium-sys-0.2.7/libsodium/src/libsodium/crypto_kx/ |
H A D | crypto_kx.c | 36 const unsigned char client_pk[crypto_kx_PUBLICKEYBYTES], in crypto_kx_client_session_keys() 61 crypto_generichash_update(&h, client_pk, crypto_kx_PUBLICKEYBYTES); in crypto_kx_client_session_keys() 79 const unsigned char client_pk[crypto_kx_PUBLICKEYBYTES]) in crypto_kx_server_session_keys() 95 if (crypto_scalarmult(q, server_sk, client_pk) != 0) { in crypto_kx_server_session_keys() 102 crypto_generichash_update(&h, client_pk, crypto_kx_PUBLICKEYBYTES); in crypto_kx_server_session_keys()
|
/dports/multimedia/gstreamer1-plugins-rust/gst-plugins-rs-d0466b3eee114207f851b37cae0015c0e718f021/cargo-crates/libsodium-sys-0.2.7/libsodium/src/libsodium/crypto_kx/ |
H A D | crypto_kx.c | 36 const unsigned char client_pk[crypto_kx_PUBLICKEYBYTES], in crypto_kx_client_session_keys() 61 crypto_generichash_update(&h, client_pk, crypto_kx_PUBLICKEYBYTES); in crypto_kx_client_session_keys() 79 const unsigned char client_pk[crypto_kx_PUBLICKEYBYTES]) in crypto_kx_server_session_keys() 95 if (crypto_scalarmult(q, server_sk, client_pk) != 0) { in crypto_kx_server_session_keys() 102 crypto_generichash_update(&h, client_pk, crypto_kx_PUBLICKEYBYTES); in crypto_kx_server_session_keys()
|
/dports/dns/encrypted-dns-server/encrypted-dns-server-0.9.1/src/ |
H A D | dnscrypt.rs | 58 let client_pk = &wrapped_packet localVariable 75 .get(client_pk) 83 .compute_shared_key(client_pk)?; 85 client_pk_.copy_from_slice(client_pk);
|
/dports/security/py-pynacl/PyNaCl-1.4.0/src/bindings/ |
H A D | crypto_kx.h | 30 const unsigned char client_pk[32], 38 const unsigned char client_pk[32]);
|
/dports/multimedia/gstreamer1-plugins-rust/gst-plugins-rs-d0466b3eee114207f851b37cae0015c0e718f021/cargo-crates/libsodium-sys-0.2.7/libsodium/src/libsodium/include/sodium/ |
H A D | crypto_kx.h | 49 const unsigned char client_pk[crypto_kx_PUBLICKEYBYTES], 59 const unsigned char client_pk[crypto_kx_PUBLICKEYBYTES])
|
/dports/security/libsodium/libsodium-1.0.18/src/libsodium/include/sodium/ |
H A D | crypto_kx.h | 49 const unsigned char client_pk[crypto_kx_PUBLICKEYBYTES], 59 const unsigned char client_pk[crypto_kx_PUBLICKEYBYTES])
|
/dports/security/py-pynacl/PyNaCl-1.4.0/src/libsodium/src/libsodium/include/sodium/ |
H A D | crypto_kx.h | 49 const unsigned char client_pk[crypto_kx_PUBLICKEYBYTES], 59 const unsigned char client_pk[crypto_kx_PUBLICKEYBYTES])
|
/dports/devel/pijul/pijul-1.0.0.a55/cargo-crates/libsodium-sys-0.2.7/libsodium/src/libsodium/include/sodium/ |
H A D | crypto_kx.h | 49 const unsigned char client_pk[crypto_kx_PUBLICKEYBYTES], 59 const unsigned char client_pk[crypto_kx_PUBLICKEYBYTES])
|
/dports/www/butterfly/butterfly-2.0.1/ |
H A D | butterfly.server.py | 231 client_pk = crypto.PKey() variable 232 client_pk.generate_key(crypto.TYPE_RSA, 2048) 241 client_cert.set_pubkey(client_pk) 242 client_cert.sign(client_pk, 'sha512') 247 pfx.set_privatekey(client_pk)
|
/dports/security/tor-devel/tor-0.4.7.2-alpha/src/feature/hs/ |
H A D | hs_cell.c | 82 curve25519_public_key_t *client_pk) in get_introduce2_key_material() argument 91 tor_assert(client_pk); in get_introduce2_key_material() 96 memcpy(client_pk->public_key, encrypted_section, CURVE25519_PUBKEY_LEN); in get_introduce2_key_material() 98 if (hs_ntor_service_get_introduce1_keys_multi(auth_key, enc_key, client_pk, in get_introduce2_key_material() 102 memwipe(client_pk, 0, sizeof(curve25519_public_key_t)); in get_introduce2_key_material() 714 &data->client_pk); in get_introduce2_keys_and_verify_mac() 821 memcpy(&data->client_pk.public_key, encrypted_section, in hs_cell_parse_introduce2() 837 encrypted_section + sizeof(data->client_pk); in hs_cell_parse_introduce2() 842 encrypted_section_len - (sizeof(data->client_pk) + DIGEST256_LEN); in hs_cell_parse_introduce2()
|
H A D | hs_cell.h | 80 curve25519_public_key_t client_pk; member
|
/dports/security/tor/tor-0.4.6.8/src/feature/hs/ |
H A D | hs_cell.c | 82 curve25519_public_key_t *client_pk) in get_introduce2_key_material() argument 91 tor_assert(client_pk); in get_introduce2_key_material() 96 memcpy(client_pk->public_key, encrypted_section, CURVE25519_PUBKEY_LEN); in get_introduce2_key_material() 98 if (hs_ntor_service_get_introduce1_keys_multi(auth_key, enc_key, client_pk, in get_introduce2_key_material() 102 memwipe(client_pk, 0, sizeof(curve25519_public_key_t)); in get_introduce2_key_material() 714 &data->client_pk); in get_introduce2_keys_and_verify_mac() 821 memcpy(&data->client_pk.public_key, encrypted_section, in hs_cell_parse_introduce2() 837 encrypted_section + sizeof(data->client_pk); in hs_cell_parse_introduce2() 842 encrypted_section_len - (sizeof(data->client_pk) + DIGEST256_LEN); in hs_cell_parse_introduce2()
|
H A D | hs_cell.h | 80 curve25519_public_key_t client_pk; member
|
/dports/security/arti/arti-9d0ede26801cdb182daa85c3eb5f0058dc178eb6/crates/tor-proto/src/crypto/handshake/ |
H A D | ntor_v3.rs | 371 let client_pk: curve25519::PublicKey = r.extract()?; in server_handshake_ntor_v3_no_keygen() localVariable 387 let xb = keypair.sk.diffie_hellman(&client_pk); in server_handshake_ntor_v3_no_keygen() 388 let (enc_key, mut mac) = kdf_msgkdf(&xb, &keypair.pk, &client_pk, verification); in server_handshake_ntor_v3_no_keygen() 396 let xy = secret_key_y.diffie_hellman(&client_pk); in server_handshake_ntor_v3_no_keygen() 422 si.write(&client_pk); in server_handshake_ntor_v3_no_keygen() 450 auth.write(&client_pk); in server_handshake_ntor_v3_no_keygen()
|
/dports/security/tor-devel/tor-0.4.7.2-alpha/src/test/ |
H A D | hs_test_helpers.h | 26 const curve25519_public_key_t *client_pk,
|
/dports/security/tor/tor-0.4.6.8/src/test/ |
H A D | hs_test_helpers.h | 26 const curve25519_public_key_t *client_pk,
|
/dports/security/py-pysodium/pysodium-0.7.10/ |
H A D | README.md | 45 crypto_kx_client_session_keys(client_pk, client_sk, server_pk) 47 crypto_kx_server_session_keys(server_pk, server_sk, client_pk)
|
/dports/security/py-pysodium/pysodium-0.7.10/pysodium.egg-info/ |
H A D | PKG-INFO | 53 crypto_kx_client_session_keys(client_pk, client_sk, server_pk) 55 crypto_kx_server_session_keys(server_pk, server_sk, client_pk)
|