Home
last modified time | relevance | path

Searched refs:pubkey (Results 1 – 25 of 55) sorted by relevance

123

/openbsd/regress/usr.bin/signify/
H A Dsignify.sh7 pubkey="$srcdir/regresskey.pub"
17 signify -V -q -p $pubkey -m $orders
19 signify -V -q -p $pubkey -m $forgery 2> /dev/null && exit 1
22 signify -V -q -p $pubkey -e -m confirmorders
25 sha256 $pubkey $seckey > HASH
29 signify -C -q -p $pubkey -x HASH.sig
36 signify -zV -p $pubkey <signed.tgz|signify -zV -p $pubkey|gunzip -t
/openbsd/sbin/unwind/libunbound/validator/
H A Dval_secalgo.c1265 if(!*pubkey) { in nss_setup_key_digest()
1284 if(!*pubkey) { in nss_setup_key_digest()
1321 if(!*pubkey) { in nss_setup_key_digest()
1334 if(!*pubkey) { in nss_setup_key_digest()
1344 if(!*pubkey) { in nss_setup_key_digest()
1384 SECKEYPublicKey* pubkey = NULL; in verify_canonrrset() local
1454 SECKEY_DestroyPublicKey(pubkey); in verify_canonrrset()
1759 struct dsa_public_key pubkey; in _verify_nettle_dsa() local
1846 struct rsa_public_key pubkey; in _verify_nettle_rsa() local
1876 nettle_mpz_set_str_256_u(pubkey.n, pubkey.size, &key[mod_offset]); in _verify_nettle_rsa()
[all …]
/openbsd/usr.sbin/unbound/validator/
H A Dval_secalgo.c1265 if(!*pubkey) { in nss_setup_key_digest()
1284 if(!*pubkey) { in nss_setup_key_digest()
1321 if(!*pubkey) { in nss_setup_key_digest()
1334 if(!*pubkey) { in nss_setup_key_digest()
1344 if(!*pubkey) { in nss_setup_key_digest()
1384 SECKEYPublicKey* pubkey = NULL; in verify_canonrrset() local
1454 SECKEY_DestroyPublicKey(pubkey); in verify_canonrrset()
1759 struct dsa_public_key pubkey; in _verify_nettle_dsa() local
1846 struct rsa_public_key pubkey; in _verify_nettle_rsa() local
1876 nettle_mpz_set_str_256_u(pubkey.n, pubkey.size, &key[mod_offset]); in _verify_nettle_rsa()
[all …]
/openbsd/usr.bin/signify/
H A Dsignify.c62 struct pubkey { struct
65 uint8_t pubkey[PUBLICBYTES]; argument
307 struct pubkey pubkey; in generate() local
315 crypto_sign_ed25519_keypair(pubkey.pubkey, enckey.seckey); in generate()
461 verifymsg(struct pubkey *pubkey, uint8_t *msg, unsigned long long msglen, in verifymsg() argument
476 pubkey->pubkey) == -1) in verifymsg()
505 readpubkey(const char *pubkeyfile, struct pubkey *pubkey, in readpubkey() argument
524 readb64file(pubkeyfile, pubkey, sizeof(*pubkey), NULL); in readpubkey()
533 struct pubkey pubkey; in verifysimple() local
553 struct pubkey pubkey; in verifyembedded() local
[all …]
/openbsd/regress/usr.bin/ssh/
H A Dsshsig.sh50 pubkey=${OBJ}/${keybase}.pub
78 cat $pubkey) > $OBJ/allowed_signers
86 cat $pubkey) > $OBJ/allowed_signers
89 -O print-pubkey \
139 cat $pubkey) > $OBJ/allowed_signers
147 cat $pubkey) > $OBJ/allowed_signers
203 cat $pubkey > $OBJ/revoked_keys
205 cat $pubkey) > $OBJ/allowed_signers
284 cat $pubkey;
513 printf "princi* " ; cat $pubkey;
[all …]
/openbsd/regress/lib/libcrypto/c2sp/
H A Dcctv.go128 func evpEd25519Verify(pubkey, msg, sig []byte) bool { argument
129 …ublic_key(C.EVP_PKEY_ED25519, nil, (*C.uchar)(unsafe.Pointer(&pubkey[0])), (C.size_t)(len(pubkey)))
153 pubkey, err := hex.DecodeString(tv.PublicKey)
170 c_verified := evpEd25519Verify(pubkey, msg, sig)
171 go_verified := ed25519.Verify(pubkey, msg, sig)
/openbsd/lib/libcrypto/x509/
H A Dx509_r2x.c77 EVP_PKEY *pubkey; in X509_REQ_to_X509() local
104 if ((pubkey = X509_REQ_get0_pubkey(r)) == NULL) in X509_REQ_to_X509()
106 if (!X509_set_pubkey(ret, pubkey)) in X509_REQ_to_X509()
H A Dx509spki.c71 return (X509_PUBKEY_set(&(x->spkac->pubkey), pkey)); in NETSCAPE_SPKI_set_pubkey()
80 return (X509_PUBKEY_get(x->spkac->pubkey)); in NETSCAPE_SPKI_get_pubkey()
/openbsd/lib/libcrypto/ct/
H A Dct_sct_ctx.c296 SCT_CTX_set1_issuer_pubkey(SCT_CTX *sctx, X509_PUBKEY *pubkey) in SCT_CTX_set1_issuer_pubkey() argument
298 return ct_public_key_hash(pubkey, &sctx->ihash, &sctx->ihashlen); in SCT_CTX_set1_issuer_pubkey()
302 SCT_CTX_set1_pubkey(SCT_CTX *sctx, X509_PUBKEY *pubkey) in SCT_CTX_set1_pubkey() argument
304 EVP_PKEY *pkey = X509_PUBKEY_get(pubkey); in SCT_CTX_set1_pubkey()
309 if (!ct_public_key_hash(pubkey, &sctx->pkeyhash, &sctx->pkeyhashlen)) { in SCT_CTX_set1_pubkey()
H A Dct_local.h193 int SCT_CTX_set1_issuer_pubkey(SCT_CTX *sctx, X509_PUBKEY *pubkey);
199 int SCT_CTX_set1_pubkey(SCT_CTX *sctx, X509_PUBKEY *pubkey);
/openbsd/usr.sbin/rpki-client/
H A Dtak.c88 X509_PUBKEY *pubkey; in parse_takey() local
133 pubkey = takey->subjectPublicKeyInfo; in parse_takey()
134 if ((res->ski = x509_pubkey_get_ski(pubkey, fn)) == NULL) in parse_takey()
137 if ((der_len = i2d_X509_PUBKEY(pubkey, &der)) <= 0) { in parse_takey()
141 res->pubkey = der; in parse_takey()
291 free(t->pubkey); in takey_free()
H A Dprint.c106 X509_PUBKEY *pubkey; in tal_print()
110 if ((pubkey = d2i_X509_PUBKEY(NULL, &der, p->pkeysz)) == NULL) in tal_print()
113 if ((ski = x509_pubkey_get_ski(pubkey, p->descr)) == NULL) in tal_print()
135 X509_PUBKEY_free(pubkey); in x509_print()
285 if (p->pubkey != NULL) in cert_print()
301 if (p->pubkey != NULL) in cert_print()
302 json_do_string("router_key", p->pubkey); in cert_print()
322 if (p->pubkey != NULL) { in cert_print()
324 p->pubkey); in cert_print()
789 if (base64_encode(t->pubkey, in takey_print()
87 X509_PUBKEY *pubkey; tal_print() local
[all...]
H A Dx509.c380 * Returns NULL on failure, on success return the SPKI as base64 encoded pubkey
389 uint8_t *pubkey = NULL; in x509_pubkey_get_ski()
423 len = i2d_PUBKEY(pkey, &pubkey); in x509_get_aia()
429 if (base64_encode(pubkey, len, &res) == -1) in x509_get_aia()
433 free(pubkey); in x509_get_aia()
442 x509_pubkey_get_ski(X509_PUBKEY *pubkey, const char *fn) in x509_get_aia()
450 if (!X509_PUBKEY_get0_param(&obj, &der, &der_len, NULL, pubkey)) { in x509_get_aia()
331 uint8_t *pubkey = NULL; x509_get_pubkey() local
384 x509_pubkey_get_ski(X509_PUBKEY * pubkey,const char * fn) x509_pubkey_get_ski() argument
H A Dcert.c1003 cert->pubkey = x509_get_pubkey(x, fn); in cert_parse_pre()
1004 if (cert->pubkey == NULL) { in cert_parse_pre()
1092 /* first check pubkey against the one from the TAL */ in ta_parse()
1095 warnx("%s: RFC 6487 (trust anchor): bad TAL pubkey", fn); in ta_parse()
1099 warnx("%s: RFC 6487 (trust anchor): missing pubkey", fn); in ta_parse()
1104 "pubkey does not match TAL pubkey", fn); in ta_parse()
1176 free(p->pubkey);
1206 io_str_buffer(b, p->pubkey);
1247 io_read_str(b, &p->pubkey);
[all...]
/openbsd/lib/libcrypto/ec/
H A Dec_ameth.c259 eckey_pub_decode(EVP_PKEY *pkey, X509_PUBKEY *pubkey) in eckey_pub_decode() argument
268 if (!X509_PUBKEY_get0_param(NULL, &p, &pklen, &palg, pubkey)) in eckey_pub_decode()
731 ASN1_BIT_STRING *pubkey) in ecdh_cms_set_peerkey() argument
766 plen = ASN1_STRING_length(pubkey); in ecdh_cms_set_peerkey()
767 p = ASN1_STRING_get0_data(pubkey); in ecdh_cms_set_peerkey()
906 ASN1_BIT_STRING *pubkey; in ecdh_cms_decrypt() local
911 if (!alg || !pubkey) in ecdh_cms_decrypt()
913 if (!ecdh_cms_set_peerkey(pctx, alg, pubkey)) { in ecdh_cms_decrypt()
936 ASN1_BIT_STRING *pubkey; in ecdh_cms_encrypt() local
962 ASN1_STRING_set0(pubkey, penc, penclen); in ecdh_cms_encrypt()
[all …]
/openbsd/usr.bin/ssh/
H A Dauthfile.c172 struct sshkey *pubkey = NULL; in sshkey_load_pubkey_from_private() local
182 KEY_UNSPEC, &pubkey)) != 0) in sshkey_load_pubkey_from_private()
184 if ((r = sshkey_set_filename(pubkey, filename)) != 0) in sshkey_load_pubkey_from_private()
188 *pubkeyp = pubkey; in sshkey_load_pubkey_from_private()
189 pubkey = NULL; in sshkey_load_pubkey_from_private()
195 sshkey_free(pubkey); in sshkey_load_pubkey_from_private()
H A Dsshd.c1168 struct sshkey *pubkey; in main() local
1448 if (pubkey != NULL && key != NULL) { in main()
1449 if (!sshkey_equal(pubkey, key)) { in main()
1452 sshkey_free(pubkey); in main()
1453 pubkey = NULL; in main()
1456 if (pubkey == NULL && key != NULL) { in main()
1457 if ((r = sshkey_from_private(key, &pubkey)) != 0) in main()
1461 if (pubkey != NULL && (r = sshkey_check_rsa_length(pubkey, in main()
1464 sshkey_free(pubkey); in main()
1469 sensitive_data.host_pubkeys[i] = pubkey; in main()
[all …]
/openbsd/lib/libcrypto/asn1/
H A Dt_spki.c87 i = OBJ_obj2nid(spki->spkac->pubkey->algor->algorithm); in NETSCAPE_SPKI_print()
90 pkey = X509_PUBKEY_get(spki->spkac->pubkey); in NETSCAPE_SPKI_print()
/openbsd/lib/libcrypto/cms/
H A Dcms_kari.c101 ASN1_BIT_STRING **pubkey, ASN1_OCTET_STRING **keyid, X509_NAME **issuer, in CMS_RecipientInfo_kari_get0_orig_id() argument
119 if (pubkey) in CMS_RecipientInfo_kari_get0_orig_id()
120 *pubkey = NULL; in CMS_RecipientInfo_kari_get0_orig_id()
132 if (pubkey) in CMS_RecipientInfo_kari_get0_orig_id()
133 *pubkey = oik->d.originatorKey->publicKey; in CMS_RecipientInfo_kari_get0_orig_id()
/openbsd/usr.bin/openssl/
H A Dspkac.c83 int pubkey; member
135 .opt.flag = &cfg.pubkey,
297 if (cfg.pubkey) in spkac_main()
H A Dx509.c143 int pubkey; member
627 .opt.order = &cfg.pubkey,
1145 EVP_PKEY *pubkey; in x509_main() local
1147 if ((pubkey = X509_get0_pubkey(x)) == NULL) { in x509_main()
1154 if (EVP_PKEY_id(pubkey) == EVP_PKEY_RSA) { in x509_main()
1155 RSA *rsa = EVP_PKEY_get0_RSA(pubkey); in x509_main()
1161 DSA *dsa = EVP_PKEY_get0_DSA(pubkey); in x509_main()
1171 } else if (cfg.pubkey == i) { in x509_main()
1172 EVP_PKEY *pubkey; in x509_main() local
1174 if ((pubkey = X509_get0_pubkey(x)) == NULL) { in x509_main()
[all …]
/openbsd/regress/lib/libcrypto/sm2/
H A Dsm2evptest.c40 const char *pubkey = in test_EVP_SM2_verify() local
71 bufio = BIO_new_mem_buf(pubkey, strlen(pubkey)); in test_EVP_SM2_verify()
/openbsd/lib/libfido2/src/
H A Dcred.c381 &cred->attcred.id, &cred->attcred.pubkey.es256) < 0) { in fido_cred_verify()
467 &cred->attcred.id, &cred->attcred.pubkey.es256) < 0) { in fido_cred_verify_self()
480 ok = es256_pk_verify_sig(&dgst, &cred->attcred.pubkey.es256, in fido_cred_verify_self()
484 ok = rs256_pk_verify_sig(&dgst, &cred->attcred.pubkey.rs256, in fido_cred_verify_self()
488 ok = eddsa_pk_verify_sig(&dgst, &cred->attcred.pubkey.eddsa, in fido_cred_verify_self()
1074 ptr = &cred->attcred.pubkey.es256; in fido_cred_pubkey_ptr()
1077 ptr = &cred->attcred.pubkey.rs256; in fido_cred_pubkey_ptr()
1080 ptr = &cred->attcred.pubkey.eddsa; in fido_cred_pubkey_ptr()
1097 len = sizeof(cred->attcred.pubkey.es256); in fido_cred_pubkey_len()
1100 len = sizeof(cred->attcred.pubkey.rs256); in fido_cred_pubkey_len()
[all …]
H A Du2f.c481 const uint8_t *pubkey, size_t pubkey_len, fido_blob_t *out) in encode_cred_authdata() argument
503 if (cbor_blob_from_ec_point(pubkey, pubkey_len, &pk_blob) < 0) { in encode_cred_authdata()
567 uint8_t pubkey[65]; in parse_register_reply() local
594 if (fido_buf_read(&reply, &len, &pubkey, sizeof(pubkey)) < 0 || in parse_register_reply()
616 if (encode_cred_authdata(cred->rp.id, kh, kh_len, pubkey, in parse_register_reply()
617 sizeof(pubkey), &ad) < 0) { in parse_register_reply()
/openbsd/sbin/iked/
H A Dconfig.c1016 struct iked_id pubkey; in config_setkeys() local
1021 memset(&pubkey, 0, sizeof(pubkey)); in config_setkeys()
1038 if (ca_pubkey_serialize(key, &pubkey) != 0) { in config_setkeys()
1053 iov[0].iov_base = &pubkey; in config_setkeys()
1054 iov[0].iov_len = sizeof(pubkey); in config_setkeys()
1055 iov[1].iov_base = ibuf_data(pubkey.id_buf); in config_setkeys()
1056 iov[1].iov_len = ibuf_size(pubkey.id_buf); in config_setkeys()
1068 ibuf_free(pubkey.id_buf); in config_setkeys()

123