/dports/security/py-coincurve/coincurve-16.0.0/libsecp256k1/src/modules/extrakeys/ |
H A D | main_impl.h | 176 ARG_CHECK(keypair != NULL); in secp256k1_keypair_create() 177 memset(keypair, 0, sizeof(*keypair)); in secp256k1_keypair_create() 182 secp256k1_keypair_save(keypair, &sk, &pk); in secp256k1_keypair_create() 183 secp256k1_memczero(keypair, sizeof(*keypair), !ret); in secp256k1_keypair_create() 193 ARG_CHECK(keypair != NULL); in secp256k1_keypair_sec() 195 memcpy(seckey, &keypair->data[0], 32); in secp256k1_keypair_sec() 203 ARG_CHECK(keypair != NULL); in secp256k1_keypair_pub() 216 ARG_CHECK(keypair != NULL); in secp256k1_keypair_xonly_pub() 238 ARG_CHECK(keypair != NULL); in secp256k1_keypair_xonly_tweak_add() 242 memset(keypair, 0, sizeof(*keypair)); in secp256k1_keypair_xonly_tweak_add() [all …]
|
/dports/security/libssh/libssh-0.9.6/src/ |
H A D | dh_key.c | 58 struct dh_keypair keypair[2]; member 105 bignum_safe_free(keypair->priv_key); in ssh_dh_free_dh_keypair() 106 bignum_safe_free(keypair->pub_key); in ssh_dh_free_dh_keypair() 113 keypair->priv_key = bignum_new(); in ssh_dh_init_dh_keypair() 114 if (keypair->priv_key == NULL) { in ssh_dh_init_dh_keypair() 118 keypair->pub_key = bignum_new(); in ssh_dh_init_dh_keypair() 119 if (keypair->pub_key == NULL) { in ssh_dh_init_dh_keypair() 127 ssh_dh_free_dh_keypair(keypair); in ssh_dh_init_dh_keypair() 152 *pub = ctx->keypair[peer].pub_key; in ssh_dh_keypair_get_keys() 171 ctx->keypair[peer].priv_key = priv; in ssh_dh_keypair_set_keys() [all …]
|
H A D | dh_crypto.c | 41 DH *keypair[2]; member 70 (ctx->keypair[peer] == NULL)) { in ssh_dh_keypair_get_keys() 92 (ctx->keypair[peer] == NULL)) { in ssh_dh_keypair_set_keys() 133 DH_free(ctx->keypair[i]); in ssh_dh_set_parameters() 134 ctx->keypair[i] = DH_new(); in ssh_dh_set_parameters() 135 if (ctx->keypair[i] == NULL) { in ssh_dh_set_parameters() 154 DH_free(ctx->keypair[0]); in ssh_dh_set_parameters() 155 DH_free(ctx->keypair[1]); in ssh_dh_set_parameters() 156 ctx->keypair[0] = NULL; in ssh_dh_set_parameters() 157 ctx->keypair[1] = NULL; in ssh_dh_set_parameters() [all …]
|
/dports/devel/dtool/dtool-0.11.0/cargo-crates/secp256k1-sys-0.4.1/depend/secp256k1/src/modules/extrakeys/ |
H A D | main_impl.h | 202 ARG_CHECK(keypair != NULL); in rustsecp256k1_v0_4_1_keypair_create() 203 memset(keypair, 0, sizeof(*keypair)); in rustsecp256k1_v0_4_1_keypair_create() 208 rustsecp256k1_v0_4_1_keypair_save(keypair, &sk, &pk); in rustsecp256k1_v0_4_1_keypair_create() 209 rustsecp256k1_v0_4_1_memczero(keypair, sizeof(*keypair), !ret); in rustsecp256k1_v0_4_1_keypair_create() 219 ARG_CHECK(keypair != NULL); in rustsecp256k1_v0_4_1_keypair_sec() 221 memcpy(seckey, &keypair->data[0], 32); in rustsecp256k1_v0_4_1_keypair_sec() 229 ARG_CHECK(keypair != NULL); in rustsecp256k1_v0_4_1_keypair_pub() 242 ARG_CHECK(keypair != NULL); in rustsecp256k1_v0_4_1_keypair_xonly_pub() 264 ARG_CHECK(keypair != NULL); in rustsecp256k1_v0_4_1_keypair_xonly_tweak_add() 268 memset(keypair, 0, sizeof(*keypair)); in rustsecp256k1_v0_4_1_keypair_xonly_tweak_add() [all …]
|
/dports/net-p2p/namecoin-utils/namecoin-core-nc0.21.0.1/src/secp256k1/src/modules/extrakeys/ |
H A D | main_impl.h | 132 secp256k1_scalar_get_b32(&keypair->data[0], sk); in secp256k1_keypair_save() 176 ARG_CHECK(keypair != NULL); in secp256k1_keypair_create() 177 memset(keypair, 0, sizeof(*keypair)); in secp256k1_keypair_create() 182 secp256k1_keypair_save(keypair, &sk, &pk); in secp256k1_keypair_create() 183 memczero(keypair, sizeof(*keypair), !ret); in secp256k1_keypair_create() 193 ARG_CHECK(keypair != NULL); in secp256k1_keypair_pub() 206 ARG_CHECK(keypair != NULL); in secp256k1_keypair_xonly_pub() 228 ARG_CHECK(keypair != NULL); in secp256k1_keypair_xonly_tweak_add() 231 ret = secp256k1_keypair_load(ctx, &sk, &pk, keypair); in secp256k1_keypair_xonly_tweak_add() 232 memset(keypair, 0, sizeof(*keypair)); in secp256k1_keypair_xonly_tweak_add() [all …]
|
/dports/net-p2p/namecoin-daemon/namecoin-core-nc0.21.0.1/src/secp256k1/src/modules/extrakeys/ |
H A D | main_impl.h | 132 secp256k1_scalar_get_b32(&keypair->data[0], sk); in secp256k1_keypair_save() 176 ARG_CHECK(keypair != NULL); in secp256k1_keypair_create() 177 memset(keypair, 0, sizeof(*keypair)); in secp256k1_keypair_create() 182 secp256k1_keypair_save(keypair, &sk, &pk); in secp256k1_keypair_create() 183 memczero(keypair, sizeof(*keypair), !ret); in secp256k1_keypair_create() 193 ARG_CHECK(keypair != NULL); in secp256k1_keypair_pub() 206 ARG_CHECK(keypair != NULL); in secp256k1_keypair_xonly_pub() 228 ARG_CHECK(keypair != NULL); in secp256k1_keypair_xonly_tweak_add() 231 ret = secp256k1_keypair_load(ctx, &sk, &pk, keypair); in secp256k1_keypair_xonly_tweak_add() 232 memset(keypair, 0, sizeof(*keypair)); in secp256k1_keypair_xonly_tweak_add() [all …]
|
/dports/net-p2p/namecoin/namecoin-core-nc0.21.0.1/src/secp256k1/src/modules/extrakeys/ |
H A D | main_impl.h | 132 secp256k1_scalar_get_b32(&keypair->data[0], sk); in secp256k1_keypair_save() 176 ARG_CHECK(keypair != NULL); in secp256k1_keypair_create() 177 memset(keypair, 0, sizeof(*keypair)); in secp256k1_keypair_create() 182 secp256k1_keypair_save(keypair, &sk, &pk); in secp256k1_keypair_create() 183 memczero(keypair, sizeof(*keypair), !ret); in secp256k1_keypair_create() 193 ARG_CHECK(keypair != NULL); in secp256k1_keypair_pub() 206 ARG_CHECK(keypair != NULL); in secp256k1_keypair_xonly_pub() 228 ARG_CHECK(keypair != NULL); in secp256k1_keypair_xonly_tweak_add() 231 ret = secp256k1_keypair_load(ctx, &sk, &pk, keypair); in secp256k1_keypair_xonly_tweak_add() 232 memset(keypair, 0, sizeof(*keypair)); in secp256k1_keypair_xonly_tweak_add() [all …]
|
/dports/net-p2p/c-lightning/lightning-0.10.2/external/libwally-core/src/secp256k1/src/modules/extrakeys/ |
H A D | main_impl.h | 132 secp256k1_scalar_get_b32(&keypair->data[0], sk); in secp256k1_keypair_save() 176 ARG_CHECK(keypair != NULL); in secp256k1_keypair_create() 177 memset(keypair, 0, sizeof(*keypair)); in secp256k1_keypair_create() 182 secp256k1_keypair_save(keypair, &sk, &pk); in secp256k1_keypair_create() 183 secp256k1_memczero(keypair, sizeof(*keypair), !ret); in secp256k1_keypair_create() 193 ARG_CHECK(keypair != NULL); in secp256k1_keypair_pub() 206 ARG_CHECK(keypair != NULL); in secp256k1_keypair_xonly_pub() 228 ARG_CHECK(keypair != NULL); in secp256k1_keypair_xonly_tweak_add() 231 ret = secp256k1_keypair_load(ctx, &sk, &pk, keypair); in secp256k1_keypair_xonly_tweak_add() 232 memset(keypair, 0, sizeof(*keypair)); in secp256k1_keypair_xonly_tweak_add() [all …]
|
/dports/databases/pgbouncer/pgbouncer-1.16.0/lib/usual/tls/ |
H A D | tls_config.c | 77 return set_mem(&keypair->cert_mem, &keypair->cert_len, cert, len); in tls_keypair_set_cert_mem() 90 if (keypair->key_mem != NULL) in tls_keypair_set_key_mem() 91 explicit_bzero(keypair->key_mem, keypair->key_len); in tls_keypair_set_key_mem() 92 return set_mem(&keypair->key_mem, &keypair->key_len, key, len); in tls_keypair_set_key_mem() 105 if (keypair == NULL) in tls_keypair_free() 108 tls_keypair_clear(keypair); in tls_keypair_free() 110 free((char *)keypair->cert_file); in tls_keypair_free() 111 free(keypair->cert_mem); in tls_keypair_free() 112 free((char *)keypair->key_file); in tls_keypair_free() 113 free(keypair->key_mem); in tls_keypair_free() [all …]
|
/dports/sysutils/ansible/ansible-4.7.0/ansible_collections/openstack/cloud/plugins/modules/ |
H A D | keypair.py | 100 def _system_state_change(self, keypair): argument 102 if state == 'present' and not keypair: 104 if state == 'absent' and keypair: 118 keypair = self.conn.get_keypair(name) 121 self.exit_json(changed=self._system_state_change(keypair)) 124 if keypair and keypair['name'] == name: 125 if public_key and (public_key != keypair['public_key']): 133 keypair = self.conn.create_keypair(name, public_key) 138 keypair = self.conn.create_keypair(name, public_key) 141 self.exit_json(changed=changed, key=keypair, id=keypair['id']) [all …]
|
H A D | os_keypair.py | 100 def _system_state_change(self, keypair): argument 102 if state == 'present' and not keypair: 104 if state == 'absent' and keypair: 118 keypair = self.conn.get_keypair(name) 121 self.exit_json(changed=self._system_state_change(keypair)) 124 if keypair and keypair['name'] == name: 125 if public_key and (public_key != keypair['public_key']): 133 keypair = self.conn.create_keypair(name, public_key) 138 keypair = self.conn.create_keypair(name, public_key) 141 self.exit_json(changed=changed, key=keypair, id=keypair['id']) [all …]
|
/dports/net/ooni-probe-cli/probe-cli-3.10.1/vendor/github.com/ooni/psiphon/oopsi/gitlab.com/yawning/obfs4.git/common/ntor/ |
H A D | ntor.go | 234 return keypair.public 239 return keypair.private 245 return keypair.representative 256 keypair := new(Keypair) 280 keypair.private.Bytes()) { 286 keypair.private.Bytes()) 289 return keypair, nil 305 keypair := new(Keypair) 309 copy(keypair.private[:], raw) 311 keypair.private.Bytes()) [all …]
|
/dports/net/ooni-probe-cli/probe-cli-3.10.1/vendor/gitlab.com/yawning/obfs4.git/common/ntor/ |
H A D | ntor.go | 235 return keypair.public 240 return keypair.private 246 return keypair.representative 257 keypair := new(Keypair) 281 keypair.private.Bytes()) { 287 keypair.private.Bytes()) 290 return keypair, nil 306 keypair := new(Keypair) 310 copy(keypair.private[:], raw) 312 keypair.private.Bytes()) [all …]
|
/dports/net/ooni-mini/probe-engine-0.23.0/vendor/github.com/ooni/psiphon/oopsi/gitlab.com/yawning/obfs4.git/common/ntor/ |
H A D | ntor.go | 234 return keypair.public 239 return keypair.private 245 return keypair.representative 256 keypair := new(Keypair) 280 keypair.private.Bytes()) { 286 keypair.private.Bytes()) 289 return keypair, nil 305 keypair := new(Keypair) 309 copy(keypair.private[:], raw) 311 keypair.private.Bytes()) [all …]
|
/dports/net/ooni-mini/probe-engine-0.23.0/vendor/gitlab.com/yawning/obfs4.git/common/ntor/ |
H A D | ntor.go | 235 return keypair.public 240 return keypair.private 246 return keypair.representative 257 keypair := new(Keypair) 281 keypair.private.Bytes()) { 287 keypair.private.Bytes()) 290 return keypair, nil 306 keypair := new(Keypair) 310 copy(keypair.private[:], raw) 312 keypair.private.Bytes()) [all …]
|
/dports/security/obfs4proxy-tor/common/ntor/ |
H A D | ntor.go | 234 return keypair.public 239 return keypair.private 245 return keypair.representative 256 keypair := new(Keypair) 280 keypair.private.Bytes()) { 286 keypair.private.Bytes()) 289 return keypair, nil 305 keypair := new(Keypair) 309 copy(keypair.private[:], raw) 311 keypair.private.Bytes()) [all …]
|
/dports/security/softether5/SoftEtherVPN-5.02.5180/src/Cedar/ |
H A D | Proto_WireGuard.c | 215 WG_KEYPAIR *keypair; in WgsProcessDatagrams() local 229 if (keypair == NULL) in WgsProcessDatagrams() 244 Free(keypair); in WgsProcessDatagrams() 584 return keypair; in WgsProcessHandshakeInit() 694 WG_KEYPAIR *keypair; in WgsProcessTransportData() local 731 keypair = previous; in WgsProcessTransportData() 803 WG_KEYPAIR *keypair; in WgsCreateTransportData() local 812 if (keypair == NULL) in WgsCreateTransportData() 843 ++keypair->CounterLocal; in WgsCreateTransportData() 864 if (counter + sizeof(keypair->ReplayWindow) < keypair->CounterRemote) in WgsIsInReplayWindow() [all …]
|
/dports/devel/py-openstacksdk/openstacksdk-0.60.0/openstack/tests/functional/cloud/ |
H A D | test_keypairs.py | 30 self.assertEqual(keypair['name'], name) 31 self.assertIsNotNone(keypair['public_key']) 32 self.assertIsNotNone(keypair['private_key']) 33 self.assertIsNotNone(keypair['fingerprint']) 34 self.assertEqual(keypair['type'], 'ssh') 48 keypair = self.user_cloud.create_keypair( 50 self.assertEqual(keypair['name'], name) 51 self.assertIsNotNone(keypair['public_key']) 52 self.assertIsNone(keypair['private_key']) 53 self.assertIsNotNone(keypair['fingerprint']) [all …]
|
/dports/security/beecrypt/beecrypt-4.2.1/tests/ |
H A D | testdsa.c | 66 dlkp_p keypair; in main() local 71 dlkp_pInit(&keypair); in main() 73 mpbsethex(&keypair.param.p, table[i].p); in main() 74 mpbsethex(&keypair.param.q, table[i].q); in main() 75 mpnsethex(&keypair.param.g, table[i].g); in main() 76 mpnsethex(&keypair.y, table[i].y); in main() 91 if (!dsavrfy(&keypair.param.p, &keypair.param.q, &keypair.param.g, &hm, &keypair.y, &e_r, &e_s)) in main() 102 dlkp_pFree(&keypair); in main()
|
/dports/sysutils/ansible2/ansible-2.9.27/lib/ansible/modules/cloud/openstack/ |
H A D | os_keypair.py | 88 def _system_state_change(module, keypair): argument 90 if state == 'present' and not keypair: 92 if state == 'absent' and keypair: 123 keypair = cloud.get_keypair(name) 126 module.exit_json(changed=_system_state_change(module, keypair)) 129 if keypair and keypair['name'] == name: 130 if public_key and (public_key != keypair['public_key']): 138 keypair = cloud.create_keypair(name, public_key) 142 key=keypair, 143 id=keypair['id']) [all …]
|
/dports/security/sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/cargo-crates/ed25519-dalek-1.0.0/tests/ |
H A D | ed25519.rs | 124 let keypair: Keypair; in sign_verify() localVariable 133 keypair = Keypair::generate(&mut csprng); in sign_verify() 134 good_sig = keypair.sign(&good); in sign_verify() 135 bad_sig = keypair.sign(&bad); in sign_verify() 137 assert!(keypair.verify(&good, &good_sig).is_ok(), in sign_verify() 139 assert!(keypair.verify(&good, &bad_sig).is_err(), in sign_verify() 147 let keypair: Keypair; in ed25519ph_sign_verify() localVariable 171 keypair = Keypair::generate(&mut csprng); in ed25519ph_sign_verify() 200 signatures.push(keypair.sign(&messages[i])); in verify_batch_seven_signatures() 201 keypairs.push(keypair); in verify_batch_seven_signatures() [all …]
|
/dports/multimedia/v4l_compat/linux-5.13-rc2/drivers/net/wireguard/ |
H A D | send.c | 126 struct noise_keypair *keypair; in keep_key_fresh() local 131 send = keypair && READ_ONCE(keypair->sending.is_valid) && in keep_key_fresh() 133 (keypair->i_am_the_initiator && in keep_key_fresh() 218 keypair->sending.key); in encrypt_packet() 265 struct noise_keypair *keypair; in wg_packet_tx_worker() local 273 keypair = PACKET_CB(first)->keypair; in wg_packet_tx_worker() 343 struct noise_keypair *keypair; in wg_packet_send_staged_packets() local 357 keypair = wg_noise_keypair_get( in wg_packet_send_staged_packets() 360 if (unlikely(!keypair)) in wg_packet_send_staged_packets() 385 wg_peer_get(keypair->entry.peer); in wg_packet_send_staged_packets() [all …]
|
/dports/multimedia/v4l-utils/linux-5.13-rc2/drivers/net/wireguard/ |
H A D | send.c | 126 struct noise_keypair *keypair; in keep_key_fresh() local 131 send = keypair && READ_ONCE(keypair->sending.is_valid) && in keep_key_fresh() 133 (keypair->i_am_the_initiator && in keep_key_fresh() 218 keypair->sending.key); in encrypt_packet() 265 struct noise_keypair *keypair; in wg_packet_tx_worker() local 273 keypair = PACKET_CB(first)->keypair; in wg_packet_tx_worker() 343 struct noise_keypair *keypair; in wg_packet_send_staged_packets() local 357 keypair = wg_noise_keypair_get( in wg_packet_send_staged_packets() 360 if (unlikely(!keypair)) in wg_packet_send_staged_packets() 385 wg_peer_get(keypair->entry.peer); in wg_packet_send_staged_packets() [all …]
|
/dports/multimedia/libv4l/linux-5.13-rc2/drivers/net/wireguard/ |
H A D | send.c | 126 struct noise_keypair *keypair; in keep_key_fresh() local 131 send = keypair && READ_ONCE(keypair->sending.is_valid) && in keep_key_fresh() 133 (keypair->i_am_the_initiator && in keep_key_fresh() 218 keypair->sending.key); in encrypt_packet() 265 struct noise_keypair *keypair; in wg_packet_tx_worker() local 273 keypair = PACKET_CB(first)->keypair; in wg_packet_tx_worker() 343 struct noise_keypair *keypair; in wg_packet_send_staged_packets() local 357 keypair = wg_noise_keypair_get( in wg_packet_send_staged_packets() 360 if (unlikely(!keypair)) in wg_packet_send_staged_packets() 385 wg_peer_get(keypair->entry.peer); in wg_packet_send_staged_packets() [all …]
|
/dports/security/arti/arti-9d0ede26801cdb182daa85c3eb5f0058dc178eb6/cargo-crates/ed25519-dalek-1.0.1/tests/ |
H A D | ed25519.rs | 124 let keypair: Keypair; in sign_verify() localVariable 133 keypair = Keypair::generate(&mut csprng); in sign_verify() 134 good_sig = keypair.sign(&good); in sign_verify() 135 bad_sig = keypair.sign(&bad); in sign_verify() 137 assert!(keypair.verify(&good, &good_sig).is_ok(), in sign_verify() 139 assert!(keypair.verify(&good, &bad_sig).is_err(), in sign_verify() 147 let keypair: Keypair; in ed25519ph_sign_verify() localVariable 171 keypair = Keypair::generate(&mut csprng); in ed25519ph_sign_verify() 200 signatures.push(keypair.sign(&messages[i])); in verify_batch_seven_signatures() 201 keypairs.push(keypair); in verify_batch_seven_signatures() [all …]
|