/openbsd/regress/lib/libcrypto/mlkem/ |
H A D | mlkem1024_keygen_tests.txt | 3 public_key: 537911957c125148a87f41589cb222d0d19229e2cb55e1a044791e7ca61192a46460c3183d2bcd6de08a5e7… 8 public_key: 938a454364cf10a4c719113a23b242bc013962f13421ec0686e32ccb80840749643eb4b5cc4182cee236671… 13 public_key: a1a341b578b4765c4649e6bfaf5c8b2ad80de5200e4dd30da0b693f5ebbfcfba9f0ad2ad46576a7a06b65de… 18 public_key: c8016eeae46e2610a5fd252102a480cac2bc6e7860620259e41c64591584f1e6ce8e3312dc8862dd806cc21… 23 public_key: 2f7a733c9c0d0a05b6ae91776032105bfa99d149062746ac1fd2ca81db9224518a39629a36d043e6a398444… 28 public_key: 69bc82661a9e822624d2a644e1767de906658569ba68922aa5c18996c58b3325685bf3564518afdbb99aa67… 33 public_key: 55f39e77f0722a726811358dc0f0b76aa90aab8c2dfdd3a4f3e31cdd076947d2b503c73b8805b26d6780d75… 38 public_key: 07f76c0d2245fe775fc5cb525824bf945b31bdbc0a86b88d8827ae7fc0a3db8bb9f534a21792637765081c4… 43 public_key: e4f12b6f27cc55032582857549f3ba0d6bafeee47ca2e2cee04b023b066f53f75a5dfaa0aca416ed16cabdb… 48 public_key: 1e778910b9afed44842d78417cd027f819699af6b0ab475a18b7359817b50c306bba0728c5a9088e667dcb7… [all …]
|
H A D | mlkem768_keygen_tests.txt | 3 public_key: a8e651a1e685f22478a8954f007bc7711b930772c78f092e82878e3e937f367967532913a8d53dfdf4bfb1f… 8 public_key: 93c140f6c47b7e53b96f72bb18447d277cc021c144a0f7a35e30b57386a78ac976376262320a5e7e1cb42e2… 13 public_key: c02b820292c46c8a8a92975a2e27292cf893a7f54a84a67022845d66236dca3c4844604b16879e849c7fe34… 18 public_key: 25c1215d624156828088b63da622afa9fc5476b3603474b24d8394b93ab494ea3eb0f33ff5d91a33d34a2f6… 23 public_key: 711cb96f0cbb88a8c1c298c7837b2f2c3525f2313ee5cba7f6dc77413cb58ed86f75d26b39729561c28b795… 28 public_key: 317771b7e77466880e15c76a39356cb459b78e6821e69b2f0f817b236a04a7cb834a743f830934043856e0d… 33 public_key: 611425c6bb62e8f60764db8466613486836fa07896314a6ea13a56e2f467483848c3451602e4c6ceb2cadf3… 38 public_key: 3790b3e85bb887d46ec144b4d8ec8bed82bddda538eea77d818c7081b3bfcec68d496035b71280b23985c6d… 43 public_key: 35775144c098e6756148a30e8ce75a67137ad2455860252b764c15823c08358c45ac820bbdc3525543a66a2… 48 public_key: 023753735c1bba67bbfd117911d0be47b827ed9773e4d50d8d11a5b6481357473ae2a766156b9a4e74169a1… [all …]
|
H A D | mlkem1024_encap_tests.txt | 3 public_key = 537911957c125148a87f41589cb222d0d19229e2cb55e1a044791e7ca61192a46460c3183d2bcd6de08a5e… 1403 public_key = 29b39d84ec83b12962ed6a6d7f859c90f8995d150c3c76a1231002f37bb369f85da6ab37f1b19663675415… 1410 public_key = 11a302f253ca27b1f8808e7b42bc4e5746a0e40071560f872a4ad8625d143cc4bf5a51abb39c39a60de287… 1417 public_key = dad163da1a9a77567f166430d7f8af8a6545941b6b9ab2c11e8695de1990f351965c10bb273a07b546405a… 1424 public_key = 034f63d80d93b240fdf3294ea3034c542acf64418eb6584bfc2eec3c6eb92c3d639239d7b887cea71b649a… 1431 public_key = 9484aa45883e1c5ecfb5b9637c66fc272c8c8033e2b7a16e81aad212461423b7d886bea7cb580c198aa442… 1438 public_key = 2548807922b7cf9a3d5b5c6762d408cdf6cbc84c3e5553907233a1542c3a3e09adee78845e087f81d81fec… 1445 public_key = 8267516418aae882a1d5a51f230d831bcea7c8aa543ac2814856df2a3f440a9d8c9544a693359ca0853341… 1452 public_key = 9b6fe56700676cb7d4760361b45e96797ad745671e925898d7bef3f03e531a6614052e822c5ede1544b275… 1459 public_key = 68d31a7b393d2563b8987531bddb014b7671b976b59cba [all …]
|
H A D | mlkem768_encap_tests.txt | 3 public_key = a8e651a1e685f22478a8954f007bc7711b930772c78f092e82878e3e937f367967532913a8d53dfdf4bfb1… 1403 public_key = d4c11aa4c8497e7240cdc5c240f1aa81f68c0f2264d5b3436bbcc75952067ec974c8b709273717a496b912… 1410 public_key = 33b69e9cb3ed32615a6a1ecbe136a0b819237c5c8be57374c1c37a495ed60c685e9a02f4f9c0c6b9ced6d9… 1417 public_key = 2088bcb70f56a579211cc75084c54ff884ee0cb3ff679e784b239b91a121739e0ba4821c42460acc5bac13… 1424 public_key = 20c186225f86b2c9c4f1ab664c45957985c32c49729c7491192e20c88e49f96d0ad4a9fe2641d590a5265c… 1431 public_key = 4c1ea03459c96859b685b456b6718401df8b6fed775b68715135fb5236b75ebc8363834cc31ab42933c929… 1438 public_key = 08a8125882d12795a94642cb1c8e775946839f835c686a2903450bb18c43209b585ef60839c87616e5b3b1… 1445 public_key = 7bc2c53f9f99ad67bb63845065fcc6c51db00147e419b2f468482060b498c0e4e4bc8fdbb430a76f6ebc8e… 1452 public_key = 8cf433e5048465359fd4d279ca333837969417ac794204bb3a3aa7cb512b5233758d803032bc6f9d01acb8… 1459 public_key = cab8796dd84b4e58c0256929056e203e73d4017c740ef9478a9d64c13166ba596a65931ab9160977de95ac… [all …]
|
H A D | mlkem_tests_util.c | 86 mlkem768_encode_public_key(const void *public_key, uint8_t **out_buf, in mlkem768_encode_public_key() argument 94 if (!MLKEM768_marshal_public_key(&cbb, public_key)) in mlkem768_encode_public_key() 130 mlkem1024_encode_public_key(const void *public_key, uint8_t **out_buf, in mlkem1024_encode_public_key() argument 138 if (!MLKEM1024_marshal_public_key(&cbb, public_key)) in mlkem1024_encode_public_key() 162 const void *public_key) in mlkem768_encap() argument 164 MLKEM768_encap(out_ciphertext, out_shared_secret, public_key); in mlkem768_encap() 170 const void *public_key, const uint8_t entropy[MLKEM_ENCAP_ENTROPY]) in mlkem768_encap_external_entropy() argument 173 public_key, entropy); in mlkem768_encap_external_entropy() 221 const void *public_key) in mlkem1024_encap() argument 223 MLKEM1024_encap(out_ciphertext, out_shared_secret, public_key); in mlkem1024_encap() [all …]
|
H A D | mlkem_tests.c | 281 void *public_key; member 353 CBS entropy, public_key, ciphertext, shared_secret; in MlkemEncapFileTest() local 358 parse_get_cbs(p, ENCAP_PUBLIC_KEY, &public_key); in MlkemEncapFileTest() 363 if (!encap->parse_public_key(encap->public_key, &public_key)) { in MlkemEncapFileTest() 369 encap->public_key, CBS_data(&entropy)); in MlkemEncapFileTest() 408 .public_key = &public_key768, in mlkem_encap_tests() 418 .public_key = &public_key1024, in mlkem_encap_tests() 495 CBS seed, public_key, private_key; in MlkemKeygenFileTest() local 501 parse_get_cbs(p, KEYGEN_PUBLIC_KEY, &public_key); in MlkemKeygenFileTest() 507 keygen->public_key_len, CBS_len(&public_key))) in MlkemKeygenFileTest() [all …]
|
/openbsd/regress/lib/libcrypto/curve25519/ |
H A D | ed25519test.c | 372 dump_info(const uint8_t *message, size_t message_len, const uint8_t *public_key, in dump_info() argument 380 hexdump(public_key, ED25519_PUBLIC_KEY_LENGTH); in dump_info() 425 uint8_t public_key[ED25519_PUBLIC_KEY_LENGTH]; in test_ED25519_signature_malleability() local 431 ED25519_keypair(public_key, private_key); in test_ED25519_signature_malleability() 435 public_key, private_key)) { in test_ED25519_signature_malleability() 437 dump_info(message, sizeof(message), public_key, private_key, in test_ED25519_signature_malleability() 442 if (!ED25519_verify(message, sizeof(message), signature, public_key)) { in test_ED25519_signature_malleability() 444 dump_info(message, sizeof(message), public_key, private_key, in test_ED25519_signature_malleability() 451 if (ED25519_verify(message, sizeof(message), signature, public_key)) { in test_ED25519_signature_malleability() 453 dump_info(message, sizeof(message), public_key, private_key, in test_ED25519_signature_malleability()
|
/openbsd/lib/libcrypto/ct/ |
H A D | ct_log.c | 83 EVP_PKEY *public_key; member 301 CTLOG_new(EVP_PKEY *public_key, const char *name) in CTLOG_new() argument 316 if (ct_v1_log_id_from_pkey(public_key, ret->log_id) != 1) in CTLOG_new() 319 ret->public_key = public_key; in CTLOG_new() 333 EVP_PKEY_free(log->public_key); in CTLOG_free() 357 return log->public_key; in CTLOG_get0_public_key()
|
/openbsd/lib/libcrypto/mlkem/ |
H A D | mlkem.h | 116 const struct MLKEM768_public_key *public_key); 141 const struct MLKEM768_public_key *public_key); 236 const struct MLKEM1024_public_key *public_key); 260 const struct MLKEM1024_public_key *public_key);
|
H A D | mlkem1024.c | 789 struct public_key { struct 796 static struct public_key * argument 799 return (struct public_key *)external; in public_key_1024_from_external() 803 struct public_key pub; 960 const struct MLKEM1024_public_key *public_key) in MLKEM1024_encap() argument 966 public_key, entropy); in MLKEM1024_encap() 975 const struct MLKEM1024_public_key *public_key, in MLKEM1024_encap_external_entropy() argument 978 const struct public_key *pub = public_key_1024_from_external(public_key); in MLKEM1024_encap_external_entropy() 1049 const struct MLKEM1024_public_key *public_key) in MLKEM1024_marshal_public_key() argument 1052 public_key_1024_from_external(public_key)); in MLKEM1024_marshal_public_key() [all …]
|
H A D | mlkem768.c | 788 struct public_key { struct 795 static struct public_key * argument 798 return (struct public_key *)external; in public_key_768_from_external() 802 struct public_key pub; 959 const struct MLKEM768_public_key *public_key) in MLKEM768_encap() argument 965 public_key, entropy); in MLKEM768_encap() 974 const struct MLKEM768_public_key *public_key, in MLKEM768_encap_external_entropy() argument 977 const struct public_key *pub = public_key_768_from_external(public_key); in MLKEM768_encap_external_entropy() 1048 const struct MLKEM768_public_key *public_key) in MLKEM768_marshal_public_key() argument 1051 public_key_768_from_external(public_key)); in MLKEM768_marshal_public_key() [all …]
|
H A D | mlkem_internal.h | 73 const struct MLKEM768_public_key *public_key, 112 const struct MLKEM1024_public_key *public_key,
|
/openbsd/regress/usr.bin/ssh/misc/sk-dummy/ |
H A D | sk-dummy.c | 86 response->public_key = NULL; in pack_key_ecdsa() 113 if ((response->public_key = malloc(response->public_key_len)) == NULL) { in pack_key_ecdsa() 118 response->public_key, response->public_key_len, NULL) == 0) { in pack_key_ecdsa() 141 if (response->public_key != NULL) { in pack_key_ecdsa() 142 memset(response->public_key, 0, in pack_key_ecdsa() 144 free(response->public_key); in pack_key_ecdsa() 145 response->public_key = NULL; in pack_key_ecdsa() 166 response->public_key = NULL; in pack_key_ed25519() 180 memcpy(response->public_key, pk, sizeof(pk)); in pack_key_ed25519() 192 free(response->public_key); in pack_key_ed25519() [all …]
|
/openbsd/lib/libcrypto/curve25519/ |
H A D | curve25519.h | 88 const uint8_t public_key[ED25519_PUBLIC_KEY_LENGTH], 98 const uint8_t public_key[ED25519_PUBLIC_KEY_LENGTH]);
|
/openbsd/usr.bin/ssh/ |
H A D | kexecdh.c | 50 const EC_POINT *public_key; in kex_ecdh_keypair() local 63 public_key = EC_KEY_get0_public_key(client_key); in kex_ecdh_keypair() 69 if ((r = sshbuf_put_ec(buf, public_key, group)) != 0 || in kex_ecdh_keypair()
|
H A D | sk-usbhid.c | 486 response->public_key = NULL; in pack_public_key_ecdsa() 534 if (ret != 0 && response->public_key != NULL) { in pack_public_key_ecdsa() 535 memset(response->public_key, 0, response->public_key_len); in pack_public_key_ecdsa() 536 free(response->public_key); in pack_public_key_ecdsa() 537 response->public_key = NULL; in pack_public_key_ecdsa() 555 response->public_key = NULL; in pack_public_key_ed25519() 571 memcpy(response->public_key, ptr, len); in pack_public_key_ed25519() 575 free(response->public_key); in pack_public_key_ed25519() 892 free(response->public_key); in sk_enroll() 1275 freezero(srk->key.public_key, srk->key.public_key_len); in read_rks() [all …]
|
H A D | ssh-sk.c | 168 freezero(r->public_key, r->public_key_len); in sshsk_free_enroll_response() 213 resp->public_key, resp->public_key_len)) != 0) { in sshsk_ecdsa_assemble() 278 memcpy(key->ed25519_pk, resp->public_key, ED25519_PK_SZ); in sshsk_ed25519_assemble() 298 if (resp->public_key == NULL || resp->key_handle == NULL) { in sshsk_key_from_response() 748 freezero(rks[i]->key.public_key, rks[i]->key.public_key_len); in sshsk_free_sk_resident_keys()
|
H A D | sk-api.h | 43 uint8_t *public_key; member
|
H A D | libcrux_mlkem768_sha3.h | 9384 Eurydice_slice public_key, in libcrux_ml_kem_serialize_deserialize_ring_elements_reduced_33() argument 9391 i < Eurydice_slice_len(public_key, uint8_t) / in libcrux_ml_kem_serialize_deserialize_ring_elements_reduced_33() 11085 libcrux_ml_kem_types_MlKemPublicKey_15 *public_key, in libcrux_ml_kem_ind_cca_encapsulate_cd() argument 11514 public_key, uint8_t); in libcrux_ml_kem_ind_cca_serialize_kem_secret_key_48() 11569 uint8_t public_key[1184U]; in libcrux_ml_kem_ind_cca_generate_keypair_8c() local 12067 uint8_t public_key[1184U]; in libcrux_ml_kem_ind_cca_generate_keypair_8c0() local 12212 Eurydice_slice public_key, in libcrux_ml_kem_serialize_deserialize_ring_elements_reduced_330() argument 12219 i < Eurydice_slice_len(public_key, uint8_t) / in libcrux_ml_kem_serialize_deserialize_ring_elements_reduced_330() 12254 uint8_t *public_key) { in libcrux_ml_kem_ind_cca_validate_public_key_19() argument 12284 uint8_t *public_key) { in libcrux_ml_kem_ind_cca_instantiations_portable_validate_public_key_4b() argument [all …]
|
/openbsd/lib/libcrypto/x509/ |
H A D | x509_req.c | 82 EVP_PKEY *public_key; in X509_to_X509_REQ() local 94 if ((public_key = X509_get0_pubkey(x509)) == NULL) in X509_to_X509_REQ() 96 if (!X509_REQ_set_pubkey(req, public_key)) in X509_to_X509_REQ()
|
H A D | x509_skey.c | 148 pk = ctx->subject_req->req_info->pubkey->public_key; in s2i_skey_id() 150 pk = ctx->subject_cert->cert_info->key->public_key; in s2i_skey_id()
|
/openbsd/lib/libcrypto/asn1/ |
H A D | x_pubkey.c | 99 .offset = offsetof(X509_PUBKEY, public_key), 195 if (key->public_key == NULL) in X509_PUBKEY_get0() 755 ASN1_STRING_set0(pub->public_key, penc, penclen); in X509_PUBKEY_set0_param() 757 return asn1_abs_set_unused_bits(pub->public_key, 0); in X509_PUBKEY_set0_param() 768 *pk = pub->public_key->data; in X509_PUBKEY_get0_param() 769 *ppklen = pub->public_key->length; in X509_PUBKEY_get0_param()
|
H A D | t_x509.c | 307 if (!EVP_Digest(x->cert_info->key->public_key->data, in X509_ocspid_print() 308 x->cert_info->key->public_key->length, in X509_ocspid_print()
|
/openbsd/lib/libcrypto/ec/ |
H A D | ec_ameth.c | 503 const EC_POINT *public_key; in do_EC_KEY_print() local 516 public_key = EC_KEY_get0_public_key(x); in do_EC_KEY_print() 517 if (public_key != NULL) { in do_EC_KEY_print() 518 if ((pub_key = EC_POINT_point2bn(group, public_key, in do_EC_KEY_print()
|
H A D | ec_asn1.c | 1280 const EC_POINT *public_key = NULL; in i2d_ECPrivateKey() local 1296 if ((public_key = EC_KEY_get0_public_key(ec_key)) == NULL) { in i2d_ECPrivateKey() 1319 if (public_key != NULL) { in i2d_ECPrivateKey() 1323 if (!ec_point_to_asn1_bit_string(group, public_key, form, in i2d_ECPrivateKey()
|