/openbsd/regress/usr.bin/signify/ |
H A D | signify.sh | 7 pubkey="$srcdir/regresskey.pub" 17 signify -V -q -p $pubkey -m $orders 19 signify -V -q -p $pubkey -m $forgery 2> /dev/null && exit 1 22 signify -V -q -p $pubkey -e -m confirmorders 25 sha256 $pubkey $seckey > HASH 29 signify -C -q -p $pubkey -x HASH.sig 36 signify -zV -p $pubkey <signed.tgz|signify -zV -p $pubkey|gunzip -t
|
/openbsd/sbin/unwind/libunbound/validator/ |
H A D | val_secalgo.c | 1265 if(!*pubkey) { in nss_setup_key_digest() 1284 if(!*pubkey) { in nss_setup_key_digest() 1321 if(!*pubkey) { in nss_setup_key_digest() 1334 if(!*pubkey) { in nss_setup_key_digest() 1344 if(!*pubkey) { in nss_setup_key_digest() 1384 SECKEYPublicKey* pubkey = NULL; in verify_canonrrset() local 1454 SECKEY_DestroyPublicKey(pubkey); in verify_canonrrset() 1759 struct dsa_public_key pubkey; in _verify_nettle_dsa() local 1846 struct rsa_public_key pubkey; in _verify_nettle_rsa() local 1876 nettle_mpz_set_str_256_u(pubkey.n, pubkey.size, &key[mod_offset]); in _verify_nettle_rsa() [all …]
|
/openbsd/usr.sbin/unbound/validator/ |
H A D | val_secalgo.c | 1265 if(!*pubkey) { in nss_setup_key_digest() 1284 if(!*pubkey) { in nss_setup_key_digest() 1321 if(!*pubkey) { in nss_setup_key_digest() 1334 if(!*pubkey) { in nss_setup_key_digest() 1344 if(!*pubkey) { in nss_setup_key_digest() 1384 SECKEYPublicKey* pubkey = NULL; in verify_canonrrset() local 1454 SECKEY_DestroyPublicKey(pubkey); in verify_canonrrset() 1759 struct dsa_public_key pubkey; in _verify_nettle_dsa() local 1846 struct rsa_public_key pubkey; in _verify_nettle_rsa() local 1876 nettle_mpz_set_str_256_u(pubkey.n, pubkey.size, &key[mod_offset]); in _verify_nettle_rsa() [all …]
|
/openbsd/usr.bin/signify/ |
H A D | signify.c | 62 struct pubkey { struct 65 uint8_t pubkey[PUBLICBYTES]; argument 307 struct pubkey pubkey; in generate() local 315 crypto_sign_ed25519_keypair(pubkey.pubkey, enckey.seckey); in generate() 461 verifymsg(struct pubkey *pubkey, uint8_t *msg, unsigned long long msglen, in verifymsg() argument 476 pubkey->pubkey) == -1) in verifymsg() 505 readpubkey(const char *pubkeyfile, struct pubkey *pubkey, in readpubkey() argument 524 readb64file(pubkeyfile, pubkey, sizeof(*pubkey), NULL); in readpubkey() 533 struct pubkey pubkey; in verifysimple() local 553 struct pubkey pubkey; in verifyembedded() local [all …]
|
/openbsd/regress/usr.bin/ssh/ |
H A D | sshsig.sh | 50 pubkey=${OBJ}/${keybase}.pub 78 cat $pubkey) > $OBJ/allowed_signers 86 cat $pubkey) > $OBJ/allowed_signers 89 -O print-pubkey \ 139 cat $pubkey) > $OBJ/allowed_signers 147 cat $pubkey) > $OBJ/allowed_signers 203 cat $pubkey > $OBJ/revoked_keys 205 cat $pubkey) > $OBJ/allowed_signers 284 cat $pubkey; 513 printf "princi* " ; cat $pubkey; [all …]
|
/openbsd/regress/lib/libcrypto/c2sp/ |
H A D | cctv.go | 128 func evpEd25519Verify(pubkey, msg, sig []byte) bool { argument 129 …ublic_key(C.EVP_PKEY_ED25519, nil, (*C.uchar)(unsafe.Pointer(&pubkey[0])), (C.size_t)(len(pubkey))) 153 pubkey, err := hex.DecodeString(tv.PublicKey) 170 c_verified := evpEd25519Verify(pubkey, msg, sig) 171 go_verified := ed25519.Verify(pubkey, msg, sig)
|
/openbsd/lib/libcrypto/x509/ |
H A D | x509_r2x.c | 77 EVP_PKEY *pubkey; in X509_REQ_to_X509() local 104 if ((pubkey = X509_REQ_get0_pubkey(r)) == NULL) in X509_REQ_to_X509() 106 if (!X509_set_pubkey(ret, pubkey)) in X509_REQ_to_X509()
|
H A D | x509spki.c | 71 return (X509_PUBKEY_set(&(x->spkac->pubkey), pkey)); in NETSCAPE_SPKI_set_pubkey() 80 return (X509_PUBKEY_get(x->spkac->pubkey)); in NETSCAPE_SPKI_get_pubkey()
|
/openbsd/lib/libcrypto/ct/ |
H A D | ct_sct_ctx.c | 296 SCT_CTX_set1_issuer_pubkey(SCT_CTX *sctx, X509_PUBKEY *pubkey) in SCT_CTX_set1_issuer_pubkey() argument 298 return ct_public_key_hash(pubkey, &sctx->ihash, &sctx->ihashlen); in SCT_CTX_set1_issuer_pubkey() 302 SCT_CTX_set1_pubkey(SCT_CTX *sctx, X509_PUBKEY *pubkey) in SCT_CTX_set1_pubkey() argument 304 EVP_PKEY *pkey = X509_PUBKEY_get(pubkey); in SCT_CTX_set1_pubkey() 309 if (!ct_public_key_hash(pubkey, &sctx->pkeyhash, &sctx->pkeyhashlen)) { in SCT_CTX_set1_pubkey()
|
H A D | ct_local.h | 193 int SCT_CTX_set1_issuer_pubkey(SCT_CTX *sctx, X509_PUBKEY *pubkey); 199 int SCT_CTX_set1_pubkey(SCT_CTX *sctx, X509_PUBKEY *pubkey);
|
/openbsd/usr.sbin/rpki-client/ |
H A D | tak.c | 88 X509_PUBKEY *pubkey; in parse_takey() local 133 pubkey = takey->subjectPublicKeyInfo; in parse_takey() 134 if ((res->ski = x509_pubkey_get_ski(pubkey, fn)) == NULL) in parse_takey() 137 if ((der_len = i2d_X509_PUBKEY(pubkey, &der)) <= 0) { in parse_takey() 141 res->pubkey = der; in parse_takey() 291 free(t->pubkey); in takey_free()
|
H A D | print.c | 106 X509_PUBKEY *pubkey; in tal_print() 110 if ((pubkey = d2i_X509_PUBKEY(NULL, &der, p->pkeysz)) == NULL) in tal_print() 113 if ((ski = x509_pubkey_get_ski(pubkey, p->descr)) == NULL) in tal_print() 135 X509_PUBKEY_free(pubkey); in x509_print() 285 if (p->pubkey != NULL) in cert_print() 301 if (p->pubkey != NULL) in cert_print() 302 json_do_string("router_key", p->pubkey); in cert_print() 322 if (p->pubkey != NULL) { in cert_print() 324 p->pubkey); in cert_print() 789 if (base64_encode(t->pubkey, in takey_print() 87 X509_PUBKEY *pubkey; tal_print() local [all...] |
H A D | x509.c | 380 * Returns NULL on failure, on success return the SPKI as base64 encoded pubkey 389 uint8_t *pubkey = NULL; in x509_pubkey_get_ski() 423 len = i2d_PUBKEY(pkey, &pubkey); in x509_get_aia() 429 if (base64_encode(pubkey, len, &res) == -1) in x509_get_aia() 433 free(pubkey); in x509_get_aia() 442 x509_pubkey_get_ski(X509_PUBKEY *pubkey, const char *fn) in x509_get_aia() 450 if (!X509_PUBKEY_get0_param(&obj, &der, &der_len, NULL, pubkey)) { in x509_get_aia() 331 uint8_t *pubkey = NULL; x509_get_pubkey() local 384 x509_pubkey_get_ski(X509_PUBKEY * pubkey,const char * fn) x509_pubkey_get_ski() argument
|
H A D | cert.c | 1003 cert->pubkey = x509_get_pubkey(x, fn); in cert_parse_pre() 1004 if (cert->pubkey == NULL) { in cert_parse_pre() 1092 /* first check pubkey against the one from the TAL */ in ta_parse() 1095 warnx("%s: RFC 6487 (trust anchor): bad TAL pubkey", fn); in ta_parse() 1099 warnx("%s: RFC 6487 (trust anchor): missing pubkey", fn); in ta_parse() 1104 "pubkey does not match TAL pubkey", fn); in ta_parse() 1176 free(p->pubkey); 1206 io_str_buffer(b, p->pubkey); 1247 io_read_str(b, &p->pubkey); [all...] |
/openbsd/lib/libcrypto/ec/ |
H A D | ec_ameth.c | 259 eckey_pub_decode(EVP_PKEY *pkey, X509_PUBKEY *pubkey) in eckey_pub_decode() argument 268 if (!X509_PUBKEY_get0_param(NULL, &p, &pklen, &palg, pubkey)) in eckey_pub_decode() 731 ASN1_BIT_STRING *pubkey) in ecdh_cms_set_peerkey() argument 766 plen = ASN1_STRING_length(pubkey); in ecdh_cms_set_peerkey() 767 p = ASN1_STRING_get0_data(pubkey); in ecdh_cms_set_peerkey() 906 ASN1_BIT_STRING *pubkey; in ecdh_cms_decrypt() local 911 if (!alg || !pubkey) in ecdh_cms_decrypt() 913 if (!ecdh_cms_set_peerkey(pctx, alg, pubkey)) { in ecdh_cms_decrypt() 936 ASN1_BIT_STRING *pubkey; in ecdh_cms_encrypt() local 962 ASN1_STRING_set0(pubkey, penc, penclen); in ecdh_cms_encrypt() [all …]
|
/openbsd/usr.bin/ssh/ |
H A D | authfile.c | 172 struct sshkey *pubkey = NULL; in sshkey_load_pubkey_from_private() local 182 KEY_UNSPEC, &pubkey)) != 0) in sshkey_load_pubkey_from_private() 184 if ((r = sshkey_set_filename(pubkey, filename)) != 0) in sshkey_load_pubkey_from_private() 188 *pubkeyp = pubkey; in sshkey_load_pubkey_from_private() 189 pubkey = NULL; in sshkey_load_pubkey_from_private() 195 sshkey_free(pubkey); in sshkey_load_pubkey_from_private()
|
H A D | sshd.c | 1168 struct sshkey *pubkey; in main() local 1448 if (pubkey != NULL && key != NULL) { in main() 1449 if (!sshkey_equal(pubkey, key)) { in main() 1452 sshkey_free(pubkey); in main() 1453 pubkey = NULL; in main() 1456 if (pubkey == NULL && key != NULL) { in main() 1457 if ((r = sshkey_from_private(key, &pubkey)) != 0) in main() 1461 if (pubkey != NULL && (r = sshkey_check_rsa_length(pubkey, in main() 1464 sshkey_free(pubkey); in main() 1469 sensitive_data.host_pubkeys[i] = pubkey; in main() [all …]
|
/openbsd/lib/libcrypto/asn1/ |
H A D | t_spki.c | 87 i = OBJ_obj2nid(spki->spkac->pubkey->algor->algorithm); in NETSCAPE_SPKI_print() 90 pkey = X509_PUBKEY_get(spki->spkac->pubkey); in NETSCAPE_SPKI_print()
|
/openbsd/lib/libcrypto/cms/ |
H A D | cms_kari.c | 101 ASN1_BIT_STRING **pubkey, ASN1_OCTET_STRING **keyid, X509_NAME **issuer, in CMS_RecipientInfo_kari_get0_orig_id() argument 119 if (pubkey) in CMS_RecipientInfo_kari_get0_orig_id() 120 *pubkey = NULL; in CMS_RecipientInfo_kari_get0_orig_id() 132 if (pubkey) in CMS_RecipientInfo_kari_get0_orig_id() 133 *pubkey = oik->d.originatorKey->publicKey; in CMS_RecipientInfo_kari_get0_orig_id()
|
/openbsd/usr.bin/openssl/ |
H A D | spkac.c | 83 int pubkey; member 135 .opt.flag = &cfg.pubkey, 297 if (cfg.pubkey) in spkac_main()
|
H A D | x509.c | 143 int pubkey; member 627 .opt.order = &cfg.pubkey, 1145 EVP_PKEY *pubkey; in x509_main() local 1147 if ((pubkey = X509_get0_pubkey(x)) == NULL) { in x509_main() 1154 if (EVP_PKEY_id(pubkey) == EVP_PKEY_RSA) { in x509_main() 1155 RSA *rsa = EVP_PKEY_get0_RSA(pubkey); in x509_main() 1161 DSA *dsa = EVP_PKEY_get0_DSA(pubkey); in x509_main() 1171 } else if (cfg.pubkey == i) { in x509_main() 1172 EVP_PKEY *pubkey; in x509_main() local 1174 if ((pubkey = X509_get0_pubkey(x)) == NULL) { in x509_main() [all …]
|
/openbsd/regress/lib/libcrypto/sm2/ |
H A D | sm2evptest.c | 40 const char *pubkey = in test_EVP_SM2_verify() local 71 bufio = BIO_new_mem_buf(pubkey, strlen(pubkey)); in test_EVP_SM2_verify()
|
/openbsd/lib/libfido2/src/ |
H A D | cred.c | 381 &cred->attcred.id, &cred->attcred.pubkey.es256) < 0) { in fido_cred_verify() 467 &cred->attcred.id, &cred->attcred.pubkey.es256) < 0) { in fido_cred_verify_self() 480 ok = es256_pk_verify_sig(&dgst, &cred->attcred.pubkey.es256, in fido_cred_verify_self() 484 ok = rs256_pk_verify_sig(&dgst, &cred->attcred.pubkey.rs256, in fido_cred_verify_self() 488 ok = eddsa_pk_verify_sig(&dgst, &cred->attcred.pubkey.eddsa, in fido_cred_verify_self() 1074 ptr = &cred->attcred.pubkey.es256; in fido_cred_pubkey_ptr() 1077 ptr = &cred->attcred.pubkey.rs256; in fido_cred_pubkey_ptr() 1080 ptr = &cred->attcred.pubkey.eddsa; in fido_cred_pubkey_ptr() 1097 len = sizeof(cred->attcred.pubkey.es256); in fido_cred_pubkey_len() 1100 len = sizeof(cred->attcred.pubkey.rs256); in fido_cred_pubkey_len() [all …]
|
H A D | u2f.c | 481 const uint8_t *pubkey, size_t pubkey_len, fido_blob_t *out) in encode_cred_authdata() argument 503 if (cbor_blob_from_ec_point(pubkey, pubkey_len, &pk_blob) < 0) { in encode_cred_authdata() 567 uint8_t pubkey[65]; in parse_register_reply() local 594 if (fido_buf_read(&reply, &len, &pubkey, sizeof(pubkey)) < 0 || in parse_register_reply() 616 if (encode_cred_authdata(cred->rp.id, kh, kh_len, pubkey, in parse_register_reply() 617 sizeof(pubkey), &ad) < 0) { in parse_register_reply()
|
/openbsd/sbin/iked/ |
H A D | config.c | 1016 struct iked_id pubkey; in config_setkeys() local 1021 memset(&pubkey, 0, sizeof(pubkey)); in config_setkeys() 1038 if (ca_pubkey_serialize(key, &pubkey) != 0) { in config_setkeys() 1053 iov[0].iov_base = &pubkey; in config_setkeys() 1054 iov[0].iov_len = sizeof(pubkey); in config_setkeys() 1055 iov[1].iov_base = ibuf_data(pubkey.id_buf); in config_setkeys() 1056 iov[1].iov_len = ibuf_size(pubkey.id_buf); in config_setkeys() 1068 ibuf_free(pubkey.id_buf); in config_setkeys()
|