Home
last modified time | relevance | path

Searched refs:public_key (Results 1 – 25 of 34) sorted by relevance

12

/openbsd/regress/lib/libcrypto/mlkem/
H A Dmlkem1024_keygen_tests.txt3 public_key: 537911957c125148a87f41589cb222d0d19229e2cb55e1a044791e7ca61192a46460c3183d2bcd6de08a5e7…
8 public_key: 938a454364cf10a4c719113a23b242bc013962f13421ec0686e32ccb80840749643eb4b5cc4182cee236671…
13 public_key: a1a341b578b4765c4649e6bfaf5c8b2ad80de5200e4dd30da0b693f5ebbfcfba9f0ad2ad46576a7a06b65de…
18 public_key: c8016eeae46e2610a5fd252102a480cac2bc6e7860620259e41c64591584f1e6ce8e3312dc8862dd806cc21…
23 public_key: 2f7a733c9c0d0a05b6ae91776032105bfa99d149062746ac1fd2ca81db9224518a39629a36d043e6a398444…
28 public_key: 69bc82661a9e822624d2a644e1767de906658569ba68922aa5c18996c58b3325685bf3564518afdbb99aa67…
33 public_key: 55f39e77f0722a726811358dc0f0b76aa90aab8c2dfdd3a4f3e31cdd076947d2b503c73b8805b26d6780d75…
38 public_key: 07f76c0d2245fe775fc5cb525824bf945b31bdbc0a86b88d8827ae7fc0a3db8bb9f534a21792637765081c4…
43 public_key: e4f12b6f27cc55032582857549f3ba0d6bafeee47ca2e2cee04b023b066f53f75a5dfaa0aca416ed16cabdb…
48 public_key: 1e778910b9afed44842d78417cd027f819699af6b0ab475a18b7359817b50c306bba0728c5a9088e667dcb7…
[all …]
H A Dmlkem768_keygen_tests.txt3 public_key: a8e651a1e685f22478a8954f007bc7711b930772c78f092e82878e3e937f367967532913a8d53dfdf4bfb1f…
8 public_key: 93c140f6c47b7e53b96f72bb18447d277cc021c144a0f7a35e30b57386a78ac976376262320a5e7e1cb42e2…
13 public_key: c02b820292c46c8a8a92975a2e27292cf893a7f54a84a67022845d66236dca3c4844604b16879e849c7fe34…
18 public_key: 25c1215d624156828088b63da622afa9fc5476b3603474b24d8394b93ab494ea3eb0f33ff5d91a33d34a2f6…
23 public_key: 711cb96f0cbb88a8c1c298c7837b2f2c3525f2313ee5cba7f6dc77413cb58ed86f75d26b39729561c28b795…
28 public_key: 317771b7e77466880e15c76a39356cb459b78e6821e69b2f0f817b236a04a7cb834a743f830934043856e0d…
33 public_key: 611425c6bb62e8f60764db8466613486836fa07896314a6ea13a56e2f467483848c3451602e4c6ceb2cadf3…
38 public_key: 3790b3e85bb887d46ec144b4d8ec8bed82bddda538eea77d818c7081b3bfcec68d496035b71280b23985c6d…
43 public_key: 35775144c098e6756148a30e8ce75a67137ad2455860252b764c15823c08358c45ac820bbdc3525543a66a2…
48 public_key: 023753735c1bba67bbfd117911d0be47b827ed9773e4d50d8d11a5b6481357473ae2a766156b9a4e74169a1…
[all …]
H A Dmlkem1024_encap_tests.txt3 public_key = 537911957c125148a87f41589cb222d0d19229e2cb55e1a044791e7ca61192a46460c3183d2bcd6de08a5e…
1403 public_key = 29b39d84ec83b12962ed6a6d7f859c90f8995d150c3c76a1231002f37bb369f85da6ab37f1b19663675415…
1410 public_key = 11a302f253ca27b1f8808e7b42bc4e5746a0e40071560f872a4ad8625d143cc4bf5a51abb39c39a60de287…
1417 public_key = dad163da1a9a77567f166430d7f8af8a6545941b6b9ab2c11e8695de1990f351965c10bb273a07b546405a…
1424 public_key = 034f63d80d93b240fdf3294ea3034c542acf64418eb6584bfc2eec3c6eb92c3d639239d7b887cea71b649a…
1431 public_key = 9484aa45883e1c5ecfb5b9637c66fc272c8c8033e2b7a16e81aad212461423b7d886bea7cb580c198aa442…
1438 public_key = 2548807922b7cf9a3d5b5c6762d408cdf6cbc84c3e5553907233a1542c3a3e09adee78845e087f81d81fec…
1445 public_key = 8267516418aae882a1d5a51f230d831bcea7c8aa543ac2814856df2a3f440a9d8c9544a693359ca0853341…
1452 public_key = 9b6fe56700676cb7d4760361b45e96797ad745671e925898d7bef3f03e531a6614052e822c5ede1544b275…
1459 public_key = 68d31a7b393d2563b8987531bddb014b7671b976b59cba
[all …]
H A Dmlkem768_encap_tests.txt3 public_key = a8e651a1e685f22478a8954f007bc7711b930772c78f092e82878e3e937f367967532913a8d53dfdf4bfb1…
1403 public_key = d4c11aa4c8497e7240cdc5c240f1aa81f68c0f2264d5b3436bbcc75952067ec974c8b709273717a496b912…
1410 public_key = 33b69e9cb3ed32615a6a1ecbe136a0b819237c5c8be57374c1c37a495ed60c685e9a02f4f9c0c6b9ced6d9…
1417 public_key = 2088bcb70f56a579211cc75084c54ff884ee0cb3ff679e784b239b91a121739e0ba4821c42460acc5bac13…
1424 public_key = 20c186225f86b2c9c4f1ab664c45957985c32c49729c7491192e20c88e49f96d0ad4a9fe2641d590a5265c…
1431 public_key = 4c1ea03459c96859b685b456b6718401df8b6fed775b68715135fb5236b75ebc8363834cc31ab42933c929…
1438 public_key = 08a8125882d12795a94642cb1c8e775946839f835c686a2903450bb18c43209b585ef60839c87616e5b3b1…
1445 public_key = 7bc2c53f9f99ad67bb63845065fcc6c51db00147e419b2f468482060b498c0e4e4bc8fdbb430a76f6ebc8e…
1452 public_key = 8cf433e5048465359fd4d279ca333837969417ac794204bb3a3aa7cb512b5233758d803032bc6f9d01acb8…
1459 public_key = cab8796dd84b4e58c0256929056e203e73d4017c740ef9478a9d64c13166ba596a65931ab9160977de95ac…
[all …]
H A Dmlkem_tests_util.c86 mlkem768_encode_public_key(const void *public_key, uint8_t **out_buf, in mlkem768_encode_public_key() argument
94 if (!MLKEM768_marshal_public_key(&cbb, public_key)) in mlkem768_encode_public_key()
130 mlkem1024_encode_public_key(const void *public_key, uint8_t **out_buf, in mlkem1024_encode_public_key() argument
138 if (!MLKEM1024_marshal_public_key(&cbb, public_key)) in mlkem1024_encode_public_key()
162 const void *public_key) in mlkem768_encap() argument
164 MLKEM768_encap(out_ciphertext, out_shared_secret, public_key); in mlkem768_encap()
170 const void *public_key, const uint8_t entropy[MLKEM_ENCAP_ENTROPY]) in mlkem768_encap_external_entropy() argument
173 public_key, entropy); in mlkem768_encap_external_entropy()
221 const void *public_key) in mlkem1024_encap() argument
223 MLKEM1024_encap(out_ciphertext, out_shared_secret, public_key); in mlkem1024_encap()
[all …]
H A Dmlkem_tests.c281 void *public_key; member
353 CBS entropy, public_key, ciphertext, shared_secret; in MlkemEncapFileTest() local
358 parse_get_cbs(p, ENCAP_PUBLIC_KEY, &public_key); in MlkemEncapFileTest()
363 if (!encap->parse_public_key(encap->public_key, &public_key)) { in MlkemEncapFileTest()
369 encap->public_key, CBS_data(&entropy)); in MlkemEncapFileTest()
408 .public_key = &public_key768, in mlkem_encap_tests()
418 .public_key = &public_key1024, in mlkem_encap_tests()
495 CBS seed, public_key, private_key; in MlkemKeygenFileTest() local
501 parse_get_cbs(p, KEYGEN_PUBLIC_KEY, &public_key); in MlkemKeygenFileTest()
507 keygen->public_key_len, CBS_len(&public_key))) in MlkemKeygenFileTest()
[all …]
/openbsd/regress/lib/libcrypto/curve25519/
H A Ded25519test.c372 dump_info(const uint8_t *message, size_t message_len, const uint8_t *public_key, in dump_info() argument
380 hexdump(public_key, ED25519_PUBLIC_KEY_LENGTH); in dump_info()
425 uint8_t public_key[ED25519_PUBLIC_KEY_LENGTH]; in test_ED25519_signature_malleability() local
431 ED25519_keypair(public_key, private_key); in test_ED25519_signature_malleability()
435 public_key, private_key)) { in test_ED25519_signature_malleability()
437 dump_info(message, sizeof(message), public_key, private_key, in test_ED25519_signature_malleability()
442 if (!ED25519_verify(message, sizeof(message), signature, public_key)) { in test_ED25519_signature_malleability()
444 dump_info(message, sizeof(message), public_key, private_key, in test_ED25519_signature_malleability()
451 if (ED25519_verify(message, sizeof(message), signature, public_key)) { in test_ED25519_signature_malleability()
453 dump_info(message, sizeof(message), public_key, private_key, in test_ED25519_signature_malleability()
/openbsd/lib/libcrypto/ct/
H A Dct_log.c83 EVP_PKEY *public_key; member
301 CTLOG_new(EVP_PKEY *public_key, const char *name) in CTLOG_new() argument
316 if (ct_v1_log_id_from_pkey(public_key, ret->log_id) != 1) in CTLOG_new()
319 ret->public_key = public_key; in CTLOG_new()
333 EVP_PKEY_free(log->public_key); in CTLOG_free()
357 return log->public_key; in CTLOG_get0_public_key()
/openbsd/lib/libcrypto/mlkem/
H A Dmlkem.h116 const struct MLKEM768_public_key *public_key);
141 const struct MLKEM768_public_key *public_key);
236 const struct MLKEM1024_public_key *public_key);
260 const struct MLKEM1024_public_key *public_key);
H A Dmlkem1024.c789 struct public_key { struct
796 static struct public_key * argument
799 return (struct public_key *)external; in public_key_1024_from_external()
803 struct public_key pub;
960 const struct MLKEM1024_public_key *public_key) in MLKEM1024_encap() argument
966 public_key, entropy); in MLKEM1024_encap()
975 const struct MLKEM1024_public_key *public_key, in MLKEM1024_encap_external_entropy() argument
978 const struct public_key *pub = public_key_1024_from_external(public_key); in MLKEM1024_encap_external_entropy()
1049 const struct MLKEM1024_public_key *public_key) in MLKEM1024_marshal_public_key() argument
1052 public_key_1024_from_external(public_key)); in MLKEM1024_marshal_public_key()
[all …]
H A Dmlkem768.c788 struct public_key { struct
795 static struct public_key * argument
798 return (struct public_key *)external; in public_key_768_from_external()
802 struct public_key pub;
959 const struct MLKEM768_public_key *public_key) in MLKEM768_encap() argument
965 public_key, entropy); in MLKEM768_encap()
974 const struct MLKEM768_public_key *public_key, in MLKEM768_encap_external_entropy() argument
977 const struct public_key *pub = public_key_768_from_external(public_key); in MLKEM768_encap_external_entropy()
1048 const struct MLKEM768_public_key *public_key) in MLKEM768_marshal_public_key() argument
1051 public_key_768_from_external(public_key)); in MLKEM768_marshal_public_key()
[all …]
H A Dmlkem_internal.h73 const struct MLKEM768_public_key *public_key,
112 const struct MLKEM1024_public_key *public_key,
/openbsd/regress/usr.bin/ssh/misc/sk-dummy/
H A Dsk-dummy.c86 response->public_key = NULL; in pack_key_ecdsa()
113 if ((response->public_key = malloc(response->public_key_len)) == NULL) { in pack_key_ecdsa()
118 response->public_key, response->public_key_len, NULL) == 0) { in pack_key_ecdsa()
141 if (response->public_key != NULL) { in pack_key_ecdsa()
142 memset(response->public_key, 0, in pack_key_ecdsa()
144 free(response->public_key); in pack_key_ecdsa()
145 response->public_key = NULL; in pack_key_ecdsa()
166 response->public_key = NULL; in pack_key_ed25519()
180 memcpy(response->public_key, pk, sizeof(pk)); in pack_key_ed25519()
192 free(response->public_key); in pack_key_ed25519()
[all …]
/openbsd/lib/libcrypto/curve25519/
H A Dcurve25519.h88 const uint8_t public_key[ED25519_PUBLIC_KEY_LENGTH],
98 const uint8_t public_key[ED25519_PUBLIC_KEY_LENGTH]);
/openbsd/usr.bin/ssh/
H A Dkexecdh.c50 const EC_POINT *public_key; in kex_ecdh_keypair() local
63 public_key = EC_KEY_get0_public_key(client_key); in kex_ecdh_keypair()
69 if ((r = sshbuf_put_ec(buf, public_key, group)) != 0 || in kex_ecdh_keypair()
H A Dsk-usbhid.c486 response->public_key = NULL; in pack_public_key_ecdsa()
534 if (ret != 0 && response->public_key != NULL) { in pack_public_key_ecdsa()
535 memset(response->public_key, 0, response->public_key_len); in pack_public_key_ecdsa()
536 free(response->public_key); in pack_public_key_ecdsa()
537 response->public_key = NULL; in pack_public_key_ecdsa()
555 response->public_key = NULL; in pack_public_key_ed25519()
571 memcpy(response->public_key, ptr, len); in pack_public_key_ed25519()
575 free(response->public_key); in pack_public_key_ed25519()
892 free(response->public_key); in sk_enroll()
1275 freezero(srk->key.public_key, srk->key.public_key_len); in read_rks()
[all …]
H A Dssh-sk.c168 freezero(r->public_key, r->public_key_len); in sshsk_free_enroll_response()
213 resp->public_key, resp->public_key_len)) != 0) { in sshsk_ecdsa_assemble()
278 memcpy(key->ed25519_pk, resp->public_key, ED25519_PK_SZ); in sshsk_ed25519_assemble()
298 if (resp->public_key == NULL || resp->key_handle == NULL) { in sshsk_key_from_response()
748 freezero(rks[i]->key.public_key, rks[i]->key.public_key_len); in sshsk_free_sk_resident_keys()
H A Dsk-api.h43 uint8_t *public_key; member
H A Dlibcrux_mlkem768_sha3.h9384 Eurydice_slice public_key, in libcrux_ml_kem_serialize_deserialize_ring_elements_reduced_33() argument
9391 i < Eurydice_slice_len(public_key, uint8_t) / in libcrux_ml_kem_serialize_deserialize_ring_elements_reduced_33()
11085 libcrux_ml_kem_types_MlKemPublicKey_15 *public_key, in libcrux_ml_kem_ind_cca_encapsulate_cd() argument
11514 public_key, uint8_t); in libcrux_ml_kem_ind_cca_serialize_kem_secret_key_48()
11569 uint8_t public_key[1184U]; in libcrux_ml_kem_ind_cca_generate_keypair_8c() local
12067 uint8_t public_key[1184U]; in libcrux_ml_kem_ind_cca_generate_keypair_8c0() local
12212 Eurydice_slice public_key, in libcrux_ml_kem_serialize_deserialize_ring_elements_reduced_330() argument
12219 i < Eurydice_slice_len(public_key, uint8_t) / in libcrux_ml_kem_serialize_deserialize_ring_elements_reduced_330()
12254 uint8_t *public_key) { in libcrux_ml_kem_ind_cca_validate_public_key_19() argument
12284 uint8_t *public_key) { in libcrux_ml_kem_ind_cca_instantiations_portable_validate_public_key_4b() argument
[all …]
/openbsd/lib/libcrypto/x509/
H A Dx509_req.c82 EVP_PKEY *public_key; in X509_to_X509_REQ() local
94 if ((public_key = X509_get0_pubkey(x509)) == NULL) in X509_to_X509_REQ()
96 if (!X509_REQ_set_pubkey(req, public_key)) in X509_to_X509_REQ()
H A Dx509_skey.c148 pk = ctx->subject_req->req_info->pubkey->public_key; in s2i_skey_id()
150 pk = ctx->subject_cert->cert_info->key->public_key; in s2i_skey_id()
/openbsd/lib/libcrypto/asn1/
H A Dx_pubkey.c99 .offset = offsetof(X509_PUBKEY, public_key),
195 if (key->public_key == NULL) in X509_PUBKEY_get0()
755 ASN1_STRING_set0(pub->public_key, penc, penclen); in X509_PUBKEY_set0_param()
757 return asn1_abs_set_unused_bits(pub->public_key, 0); in X509_PUBKEY_set0_param()
768 *pk = pub->public_key->data; in X509_PUBKEY_get0_param()
769 *ppklen = pub->public_key->length; in X509_PUBKEY_get0_param()
H A Dt_x509.c307 if (!EVP_Digest(x->cert_info->key->public_key->data, in X509_ocspid_print()
308 x->cert_info->key->public_key->length, in X509_ocspid_print()
/openbsd/lib/libcrypto/ec/
H A Dec_ameth.c503 const EC_POINT *public_key; in do_EC_KEY_print() local
516 public_key = EC_KEY_get0_public_key(x); in do_EC_KEY_print()
517 if (public_key != NULL) { in do_EC_KEY_print()
518 if ((pub_key = EC_POINT_point2bn(group, public_key, in do_EC_KEY_print()
H A Dec_asn1.c1280 const EC_POINT *public_key = NULL; in i2d_ECPrivateKey() local
1296 if ((public_key = EC_KEY_get0_public_key(ec_key)) == NULL) { in i2d_ECPrivateKey()
1319 if (public_key != NULL) { in i2d_ECPrivateKey()
1323 if (!ec_point_to_asn1_bit_string(group, public_key, form, in i2d_ECPrivateKey()

12