/third_party/openssl/providers/implementations/encode_decode/ |
H A D | encode_key2blob.c | 92 unsigned char *pubkey = NULL; in key2blob_encode() local 94 pubkey_len = i2o_ECPublicKey(key, &pubkey); in key2blob_encode() 95 if (pubkey_len > 0 && pubkey != NULL) in key2blob_encode() 96 ok = write_blob(vctx, cout, pubkey, pubkey_len); in key2blob_encode() 97 OPENSSL_free(pubkey); in key2blob_encode()
|
/third_party/node/deps/openssl/openssl/crypto/cms/ |
H A D | cms_ec.c | 73 X509_ALGOR *alg, ASN1_BIT_STRING *pubkey) in ecdh_cms_set_peerkey() 108 plen = ASN1_STRING_length(pubkey); in ecdh_cms_set_peerkey() 109 p = ASN1_STRING_get0_data(pubkey); in ecdh_cms_set_peerkey() 229 ASN1_BIT_STRING *pubkey; in ecdh_cms_decrypt() local 231 if (!CMS_RecipientInfo_kari_get0_orig_id(ri, &alg, &pubkey, in ecdh_cms_decrypt() 234 if (alg == NULL || pubkey == NULL) in ecdh_cms_decrypt() 236 if (!ecdh_cms_set_peerkey(pctx, alg, pubkey)) { in ecdh_cms_decrypt() 257 ASN1_BIT_STRING *pubkey; in ecdh_cms_encrypt() local 271 if (!CMS_RecipientInfo_kari_get0_orig_id(ri, &talg, &pubkey, in ecdh_cms_encrypt() 283 ASN1_STRING_set0(pubkey, pen in ecdh_cms_encrypt() 72 ecdh_cms_set_peerkey(EVP_PKEY_CTX *pctx, X509_ALGOR *alg, ASN1_BIT_STRING *pubkey) ecdh_cms_set_peerkey() argument [all...] |
/third_party/openssl/crypto/cms/ |
H A D | cms_ec.c | 73 X509_ALGOR *alg, ASN1_BIT_STRING *pubkey) in ecdh_cms_set_peerkey() 108 plen = ASN1_STRING_length(pubkey); in ecdh_cms_set_peerkey() 109 p = ASN1_STRING_get0_data(pubkey); in ecdh_cms_set_peerkey() 229 ASN1_BIT_STRING *pubkey; in ecdh_cms_decrypt() local 231 if (!CMS_RecipientInfo_kari_get0_orig_id(ri, &alg, &pubkey, in ecdh_cms_decrypt() 234 if (alg == NULL || pubkey == NULL) in ecdh_cms_decrypt() 236 if (!ecdh_cms_set_peerkey(pctx, alg, pubkey)) { in ecdh_cms_decrypt() 257 ASN1_BIT_STRING *pubkey; in ecdh_cms_encrypt() local 271 if (!CMS_RecipientInfo_kari_get0_orig_id(ri, &talg, &pubkey, in ecdh_cms_encrypt() 283 ASN1_STRING_set0(pubkey, pen in ecdh_cms_encrypt() 72 ecdh_cms_set_peerkey(EVP_PKEY_CTX *pctx, X509_ALGOR *alg, ASN1_BIT_STRING *pubkey) ecdh_cms_set_peerkey() argument [all...] |
/third_party/node/deps/openssl/openssl/crypto/ec/curve448/ |
H A D | eddsa.c | 113 uint8_t pubkey[EDDSA_448_PUBLIC_BYTES], in ossl_c448_ed448_derive_public_key() 148 ossl_curve448_point_mul_by_ratio_and_encode_like_eddsa(pubkey, p); in ossl_c448_ed448_derive_public_key() 162 const uint8_t pubkey[EDDSA_448_PUBLIC_BYTES], in ossl_c448_ed448_sign() 238 || !EVP_DigestUpdate(hashctx, pubkey, EDDSA_448_PUBLIC_BYTES) in ossl_c448_ed448_sign() 271 const uint8_t pubkey[EDDSA_448_PUBLIC_BYTES], in ossl_c448_ed448_sign_prehash() 275 return ossl_c448_ed448_sign(ctx, signature, privkey, pubkey, hash, 64, 1, in ossl_c448_ed448_sign_prehash() 283 const uint8_t pubkey[EDDSA_448_PUBLIC_BYTES], in ossl_c448_ed448_verify() 318 ossl_curve448_point_decode_like_eddsa_and_mul_by_ratio(pk_point, pubkey); in ossl_c448_ed448_verify() 337 || !EVP_DigestUpdate(hashctx, pubkey, EDDSA_448_PUBLIC_BYTES) in ossl_c448_ed448_verify() 367 const uint8_t pubkey[EDDSA_448_PUBLIC_BYTE in ossl_c448_ed448_verify_prehash() 111 ossl_c448_ed448_derive_public_key( OSSL_LIB_CTX *ctx, uint8_t pubkey[EDDSA_448_PUBLIC_BYTES], const uint8_t privkey[EDDSA_448_PRIVATE_BYTES], const char *propq) ossl_c448_ed448_derive_public_key() argument 159 ossl_c448_ed448_sign(OSSL_LIB_CTX *ctx, uint8_t signature[EDDSA_448_SIGNATURE_BYTES], const uint8_t privkey[EDDSA_448_PRIVATE_BYTES], const uint8_t pubkey[EDDSA_448_PUBLIC_BYTES], const uint8_t *message, size_t message_len, uint8_t prehashed, const uint8_t *context, size_t context_len, const char *propq) ossl_c448_ed448_sign() argument 267 ossl_c448_ed448_sign_prehash( OSSL_LIB_CTX *ctx, uint8_t signature[EDDSA_448_SIGNATURE_BYTES], const uint8_t privkey[EDDSA_448_PRIVATE_BYTES], const uint8_t pubkey[EDDSA_448_PUBLIC_BYTES], const uint8_t hash[64], const uint8_t *context, size_t context_len, const char *propq) ossl_c448_ed448_sign_prehash() argument 280 ossl_c448_ed448_verify( OSSL_LIB_CTX *ctx, const uint8_t signature[EDDSA_448_SIGNATURE_BYTES], const uint8_t pubkey[EDDSA_448_PUBLIC_BYTES], const uint8_t *message, size_t message_len, uint8_t prehashed, const uint8_t *context, uint8_t context_len, const char *propq) ossl_c448_ed448_verify() argument 364 ossl_c448_ed448_verify_prehash( OSSL_LIB_CTX *ctx, const uint8_t signature[EDDSA_448_SIGNATURE_BYTES], const uint8_t pubkey[EDDSA_448_PUBLIC_BYTES], const uint8_t hash[64], const uint8_t *context, uint8_t context_len, const char *propq) ossl_c448_ed448_verify_prehash() argument [all...] |
/third_party/openssl/crypto/ec/curve448/ |
H A D | eddsa.c | 113 uint8_t pubkey[EDDSA_448_PUBLIC_BYTES], in ossl_c448_ed448_derive_public_key() 148 ossl_curve448_point_mul_by_ratio_and_encode_like_eddsa(pubkey, p); in ossl_c448_ed448_derive_public_key() 162 const uint8_t pubkey[EDDSA_448_PUBLIC_BYTES], in ossl_c448_ed448_sign() 238 || !EVP_DigestUpdate(hashctx, pubkey, EDDSA_448_PUBLIC_BYTES) in ossl_c448_ed448_sign() 271 const uint8_t pubkey[EDDSA_448_PUBLIC_BYTES], in ossl_c448_ed448_sign_prehash() 275 return ossl_c448_ed448_sign(ctx, signature, privkey, pubkey, hash, 64, 1, in ossl_c448_ed448_sign_prehash() 283 const uint8_t pubkey[EDDSA_448_PUBLIC_BYTES], in ossl_c448_ed448_verify() 318 ossl_curve448_point_decode_like_eddsa_and_mul_by_ratio(pk_point, pubkey); in ossl_c448_ed448_verify() 337 || !EVP_DigestUpdate(hashctx, pubkey, EDDSA_448_PUBLIC_BYTES) in ossl_c448_ed448_verify() 367 const uint8_t pubkey[EDDSA_448_PUBLIC_BYTE in ossl_c448_ed448_verify_prehash() 111 ossl_c448_ed448_derive_public_key( OSSL_LIB_CTX *ctx, uint8_t pubkey[EDDSA_448_PUBLIC_BYTES], const uint8_t privkey[EDDSA_448_PRIVATE_BYTES], const char *propq) ossl_c448_ed448_derive_public_key() argument 159 ossl_c448_ed448_sign(OSSL_LIB_CTX *ctx, uint8_t signature[EDDSA_448_SIGNATURE_BYTES], const uint8_t privkey[EDDSA_448_PRIVATE_BYTES], const uint8_t pubkey[EDDSA_448_PUBLIC_BYTES], const uint8_t *message, size_t message_len, uint8_t prehashed, const uint8_t *context, size_t context_len, const char *propq) ossl_c448_ed448_sign() argument 267 ossl_c448_ed448_sign_prehash( OSSL_LIB_CTX *ctx, uint8_t signature[EDDSA_448_SIGNATURE_BYTES], const uint8_t privkey[EDDSA_448_PRIVATE_BYTES], const uint8_t pubkey[EDDSA_448_PUBLIC_BYTES], const uint8_t hash[64], const uint8_t *context, size_t context_len, const char *propq) ossl_c448_ed448_sign_prehash() argument 280 ossl_c448_ed448_verify( OSSL_LIB_CTX *ctx, const uint8_t signature[EDDSA_448_SIGNATURE_BYTES], const uint8_t pubkey[EDDSA_448_PUBLIC_BYTES], const uint8_t *message, size_t message_len, uint8_t prehashed, const uint8_t *context, uint8_t context_len, const char *propq) ossl_c448_ed448_verify() argument 364 ossl_c448_ed448_verify_prehash( OSSL_LIB_CTX *ctx, const uint8_t signature[EDDSA_448_SIGNATURE_BYTES], const uint8_t pubkey[EDDSA_448_PUBLIC_BYTES], const uint8_t hash[64], const uint8_t *context, uint8_t context_len, const char *propq) ossl_c448_ed448_verify_prehash() argument [all...] |
/kernel/linux/linux-5.10/drivers/net/wireguard/ |
H A D | peerlookup.c | 11 const u8 pubkey[NOISE_PUBLIC_KEY_LEN]) in pubkey_bucket() 17 const u64 hash = siphash(pubkey, NOISE_PUBLIC_KEY_LEN, &table->key); in pubkey_bucket() 55 const u8 pubkey[NOISE_PUBLIC_KEY_LEN]) in wg_pubkey_hashtable_lookup() 60 hlist_for_each_entry_rcu_bh(iter_peer, pubkey_bucket(table, pubkey), in wg_pubkey_hashtable_lookup() 62 if (!memcmp(pubkey, iter_peer->handshake.remote_static, in wg_pubkey_hashtable_lookup() 10 pubkey_bucket(struct pubkey_hashtable *table, const u8 pubkey[NOISE_PUBLIC_KEY_LEN]) pubkey_bucket() argument 54 wg_pubkey_hashtable_lookup(struct pubkey_hashtable *table, const u8 pubkey[NOISE_PUBLIC_KEY_LEN]) wg_pubkey_hashtable_lookup() argument
|
/kernel/linux/linux-6.6/drivers/net/wireguard/ |
H A D | peerlookup.c | 11 const u8 pubkey[NOISE_PUBLIC_KEY_LEN]) in pubkey_bucket() 17 const u64 hash = siphash(pubkey, NOISE_PUBLIC_KEY_LEN, &table->key); in pubkey_bucket() 55 const u8 pubkey[NOISE_PUBLIC_KEY_LEN]) in wg_pubkey_hashtable_lookup() 60 hlist_for_each_entry_rcu_bh(iter_peer, pubkey_bucket(table, pubkey), in wg_pubkey_hashtable_lookup() 62 if (!memcmp(pubkey, iter_peer->handshake.remote_static, in wg_pubkey_hashtable_lookup() 10 pubkey_bucket(struct pubkey_hashtable *table, const u8 pubkey[NOISE_PUBLIC_KEY_LEN]) pubkey_bucket() argument 54 wg_pubkey_hashtable_lookup(struct pubkey_hashtable *table, const u8 pubkey[NOISE_PUBLIC_KEY_LEN]) wg_pubkey_hashtable_lookup() argument
|
/third_party/node/deps/openssl/openssl/crypto/dh/ |
H A D | dh_key.c | 387 BIGNUM *pubkey = NULL; in ossl_dh_buf2key() local 391 if ((pubkey = BN_bin2bn(buf, len, NULL)) == NULL) in ossl_dh_buf2key() 399 if (!ossl_dh_check_pub_key_partial(dh, pubkey, &ret)) { in ossl_dh_buf2key() 403 if (DH_set0_key(dh, pubkey, NULL) != 1) in ossl_dh_buf2key() 408 BN_free(pubkey); in ossl_dh_buf2key() 415 const BIGNUM *pubkey; in ossl_dh_key2buf() local 421 DH_get0_key(dh, &pubkey, NULL); in ossl_dh_key2buf() 422 if (p == NULL || pubkey == NULL in ossl_dh_key2buf() 424 || BN_num_bytes(pubkey) == 0) { in ossl_dh_key2buf() 444 if (BN_bn2binpad(pubkey, pbu in ossl_dh_key2buf() [all...] |
/third_party/openssl/crypto/dh/ |
H A D | dh_key.c | 388 BIGNUM *pubkey = NULL; in ossl_dh_buf2key() local 392 if ((pubkey = BN_bin2bn(buf, len, NULL)) == NULL) in ossl_dh_buf2key() 400 if (!ossl_dh_check_pub_key_partial(dh, pubkey, &ret)) { in ossl_dh_buf2key() 404 if (DH_set0_key(dh, pubkey, NULL) != 1) in ossl_dh_buf2key() 409 BN_free(pubkey); in ossl_dh_buf2key() 416 const BIGNUM *pubkey; in ossl_dh_key2buf() local 422 DH_get0_key(dh, &pubkey, NULL); in ossl_dh_key2buf() 423 if (p == NULL || pubkey == NULL in ossl_dh_key2buf() 425 || BN_num_bytes(pubkey) == 0) { in ossl_dh_key2buf() 445 if (BN_bn2binpad(pubkey, pbu in ossl_dh_key2buf() [all...] |
/third_party/node/deps/openssl/openssl/crypto/x509/ |
H A D | x_req.c | 71 if (old->req_info.pubkey != NULL) { in req_cb() 72 EVP_PKEY *pkey = X509_PUBKEY_get0(old->req_info.pubkey); in req_cb() 80 if (!X509_PUBKEY_set(&ret->req_info.pubkey, pkey)) { in req_cb() 112 ASN1_SIMPLE(X509_REQ_INFO, pubkey, X509_PUBKEY),
|
H A D | v3_akid.c | 168 X509_PUBKEY *pubkey = NULL; in v2i_AUTHORITY_KEYID() local 170 if (X509_PUBKEY_set(&pubkey, ctx->issuer_pkey)) in v2i_AUTHORITY_KEYID() 171 ikeyid = ossl_x509_pubkey_hash(pubkey); in v2i_AUTHORITY_KEYID() 172 X509_PUBKEY_free(pubkey); in v2i_AUTHORITY_KEYID()
|
/third_party/openssl/crypto/x509/ |
H A D | x_req.c | 71 if (old->req_info.pubkey != NULL) { in req_cb() 72 EVP_PKEY *pkey = X509_PUBKEY_get0(old->req_info.pubkey); in req_cb() 80 if (!X509_PUBKEY_set(&ret->req_info.pubkey, pkey)) { in req_cb() 112 ASN1_SIMPLE(X509_REQ_INFO, pubkey, X509_PUBKEY),
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/wps/ |
H A D | wps_common.c | 64 struct wpabuf *pubkey, *dh_shared; in wps_derive_keys() local 75 pubkey = wps->registrar ? wps->dh_pubkey_e : wps->dh_pubkey_r; in wps_derive_keys() 76 if (pubkey == NULL) { in wps_derive_keys() 82 wpa_hexdump_buf(MSG_DEBUG, "WPS: DH peer Public Key", pubkey); in wps_derive_keys() 83 dh_shared = dh5_derive_shared(wps->dh_ctx, pubkey, wps->dh_privkey); in wps_derive_keys() 413 const struct wpabuf *pubkey, in wps_build_nfc_pw_token() 422 if (wps_build_oob_dev_pw(data, dev_pw_id, pubkey, in wps_build_nfc_pw_token() 624 struct wpabuf * wps_nfc_token_build(int ndef, int id, struct wpabuf *pubkey, in wps_nfc_token_build() argument 629 if (pubkey == NULL || dev_pw == NULL) in wps_nfc_token_build() 632 ret = wps_build_nfc_pw_token(id, pubkey, dev_p in wps_nfc_token_build() 412 wps_build_nfc_pw_token(u16 dev_pw_id, const struct wpabuf *pubkey, const struct wpabuf *dev_pw) wps_build_nfc_pw_token() argument 646 wps_nfc_gen_dh(struct wpabuf **pubkey, struct wpabuf **privkey) wps_nfc_gen_dh() argument 672 wps_nfc_token_gen(int ndef, int *id, struct wpabuf **pubkey, struct wpabuf **privkey, struct wpabuf **dev_pw) wps_nfc_token_gen() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/wps/ |
H A D | wps_common.c | 64 struct wpabuf *pubkey, *dh_shared; in wps_derive_keys() local 75 pubkey = wps->registrar ? wps->dh_pubkey_e : wps->dh_pubkey_r; in wps_derive_keys() 76 if (pubkey == NULL) { in wps_derive_keys() 82 wpa_hexdump_buf(MSG_DEBUG, "WPS: DH peer Public Key", pubkey); in wps_derive_keys() 83 dh_shared = dh5_derive_shared(wps->dh_ctx, pubkey, wps->dh_privkey); in wps_derive_keys() 413 const struct wpabuf *pubkey, in wps_build_nfc_pw_token() 422 if (wps_build_oob_dev_pw(data, dev_pw_id, pubkey, in wps_build_nfc_pw_token() 624 struct wpabuf * wps_nfc_token_build(int ndef, int id, struct wpabuf *pubkey, in wps_nfc_token_build() argument 629 if (pubkey == NULL || dev_pw == NULL) in wps_nfc_token_build() 632 ret = wps_build_nfc_pw_token(id, pubkey, dev_p in wps_nfc_token_build() 412 wps_build_nfc_pw_token(u16 dev_pw_id, const struct wpabuf *pubkey, const struct wpabuf *dev_pw) wps_build_nfc_pw_token() argument 646 wps_nfc_gen_dh(struct wpabuf **pubkey, struct wpabuf **privkey) wps_nfc_gen_dh() argument 672 wps_nfc_token_gen(int ndef, int *id, struct wpabuf **pubkey, struct wpabuf **privkey, struct wpabuf **dev_pw) wps_nfc_token_gen() argument [all...] |
/third_party/openssl/test/ |
H A D | enginetest.c | 362 X509_PUBKEY *pubkey, *duppubkey = NULL; in test_x509_dup_w_engine() local 377 if (!TEST_ptr(pubkey = X509_get_X509_PUBKEY(cert)) in test_x509_dup_w_engine() 378 || !TEST_ptr(duppubkey = X509_PUBKEY_dup(pubkey)) in test_x509_dup_w_engine() 379 || !TEST_ptr_ne(duppubkey, pubkey) in test_x509_dup_w_engine() 380 || !TEST_ptr_ne(X509_PUBKEY_get0(duppubkey), X509_PUBKEY_get0(pubkey))) in test_x509_dup_w_engine() 411 if (!TEST_ptr(pubkey = X509_get_X509_PUBKEY(cert)) in test_x509_dup_w_engine() 412 || !TEST_ptr(duppubkey = X509_PUBKEY_dup(pubkey)) in test_x509_dup_w_engine() 413 || !TEST_ptr_ne(duppubkey, pubkey) in test_x509_dup_w_engine() 414 || !TEST_ptr_ne(X509_PUBKEY_get0(duppubkey), X509_PUBKEY_get0(pubkey))) in test_x509_dup_w_engine()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | crypto_gnutls.c | 287 u8 *pubkey) in crypto_dh_init() 300 pubkey, &pubkey_len) < 0) in crypto_dh_init() 304 os_memmove(pubkey + pad, pubkey, pubkey_len); in crypto_dh_init() 305 os_memset(pubkey, 0, pad); in crypto_dh_init() 315 const u8 *pubkey, size_t pubkey_len, in crypto_dh_derive_secret() 323 os_memcmp(pubkey, prime, prime_len) >= 0)) in crypto_dh_derive_secret() 326 if (gcry_mpi_scan(&pub, GCRYMPI_FMT_USG, pubkey, pubkey_len, NULL) != in crypto_dh_derive_secret() 335 /* verify: pubkey^q == 1 mod p */ in crypto_dh_derive_secret() 353 res = crypto_mod_exp(pubkey, pubkey_le in crypto_dh_derive_secret() 286 crypto_dh_init(u8 generator, const u8 *prime, size_t prime_len, u8 *privkey, u8 *pubkey) crypto_dh_init() argument 312 crypto_dh_derive_secret(u8 generator, const u8 *prime, size_t prime_len, const u8 *order, size_t order_len, const u8 *privkey, size_t privkey_len, const u8 *pubkey, size_t pubkey_len, u8 *secret, size_t *len) crypto_dh_derive_secret() argument [all...] |
H A D | crypto_nettle.c | 308 u8 *pubkey) in crypto_dh_init() 321 pubkey, &pubkey_len) < 0) in crypto_dh_init() 325 os_memmove(pubkey + pad, pubkey, pubkey_len); in crypto_dh_init() 326 os_memset(pubkey, 0, pad); in crypto_dh_init() 336 const u8 *pubkey, size_t pubkey_len, in crypto_dh_derive_secret() 344 os_memcmp(pubkey, prime, prime_len) >= 0)) in crypto_dh_derive_secret() 348 mpz_import(pub, pubkey_len, 1, 1, 1, 0, pubkey); in crypto_dh_derive_secret() 356 /* verify: pubkey^q == 1 mod p */ in crypto_dh_derive_secret() 367 res = crypto_mod_exp(pubkey, pubkey_le in crypto_dh_derive_secret() 307 crypto_dh_init(u8 generator, const u8 *prime, size_t prime_len, u8 *privkey, u8 *pubkey) crypto_dh_init() argument 333 crypto_dh_derive_secret(u8 generator, const u8 *prime, size_t prime_len, const u8 *order, size_t order_len, const u8 *privkey, size_t privkey_len, const u8 *pubkey, size_t pubkey_len, u8 *secret, size_t *len) crypto_dh_derive_secret() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | crypto_gnutls.c | 287 u8 *pubkey) in crypto_dh_init() 300 pubkey, &pubkey_len) < 0) in crypto_dh_init() 304 os_memmove(pubkey + pad, pubkey, pubkey_len); in crypto_dh_init() 305 os_memset(pubkey, 0, pad); in crypto_dh_init() 315 const u8 *pubkey, size_t pubkey_len, in crypto_dh_derive_secret() 323 os_memcmp(pubkey, prime, prime_len) >= 0)) in crypto_dh_derive_secret() 326 if (gcry_mpi_scan(&pub, GCRYMPI_FMT_USG, pubkey, pubkey_len, NULL) != in crypto_dh_derive_secret() 335 /* verify: pubkey^q == 1 mod p */ in crypto_dh_derive_secret() 353 res = crypto_mod_exp(pubkey, pubkey_le in crypto_dh_derive_secret() 286 crypto_dh_init(u8 generator, const u8 *prime, size_t prime_len, u8 *privkey, u8 *pubkey) crypto_dh_init() argument 312 crypto_dh_derive_secret(u8 generator, const u8 *prime, size_t prime_len, const u8 *order, size_t order_len, const u8 *privkey, size_t privkey_len, const u8 *pubkey, size_t pubkey_len, u8 *secret, size_t *len) crypto_dh_derive_secret() argument [all...] |
H A D | crypto_nettle.c | 308 u8 *pubkey) in crypto_dh_init() 321 pubkey, &pubkey_len) < 0) in crypto_dh_init() 325 os_memmove(pubkey + pad, pubkey, pubkey_len); in crypto_dh_init() 326 os_memset(pubkey, 0, pad); in crypto_dh_init() 336 const u8 *pubkey, size_t pubkey_len, in crypto_dh_derive_secret() 344 os_memcmp(pubkey, prime, prime_len) >= 0)) in crypto_dh_derive_secret() 348 mpz_import(pub, pubkey_len, 1, 1, 1, 0, pubkey); in crypto_dh_derive_secret() 356 /* verify: pubkey^q == 1 mod p */ in crypto_dh_derive_secret() 367 res = crypto_mod_exp(pubkey, pubkey_le in crypto_dh_derive_secret() 307 crypto_dh_init(u8 generator, const u8 *prime, size_t prime_len, u8 *privkey, u8 *pubkey) crypto_dh_init() argument 333 crypto_dh_derive_secret(u8 generator, const u8 *prime, size_t prime_len, const u8 *order, size_t order_len, const u8 *privkey, size_t privkey_len, const u8 *pubkey, size_t pubkey_len, u8 *secret, size_t *len) crypto_dh_derive_secret() argument [all...] |
/third_party/node/deps/openssl/openssl/crypto/ct/ |
H A D | ct_sct_ctx.c | 253 int SCT_CTX_set1_issuer_pubkey(SCT_CTX *sctx, X509_PUBKEY *pubkey) in SCT_CTX_set1_issuer_pubkey() argument 255 return ct_public_key_hash(sctx, pubkey, &sctx->ihash, &sctx->ihashlen); in SCT_CTX_set1_issuer_pubkey() 258 int SCT_CTX_set1_pubkey(SCT_CTX *sctx, X509_PUBKEY *pubkey) in SCT_CTX_set1_pubkey() argument 260 EVP_PKEY *pkey = X509_PUBKEY_get(pubkey); in SCT_CTX_set1_pubkey() 265 if (!ct_public_key_hash(sctx, pubkey, &sctx->pkeyhash, &sctx->pkeyhashlen)) { in SCT_CTX_set1_pubkey()
|
/third_party/openssl/crypto/ct/ |
H A D | ct_sct_ctx.c | 253 int SCT_CTX_set1_issuer_pubkey(SCT_CTX *sctx, X509_PUBKEY *pubkey) in SCT_CTX_set1_issuer_pubkey() argument 255 return ct_public_key_hash(sctx, pubkey, &sctx->ihash, &sctx->ihashlen); in SCT_CTX_set1_issuer_pubkey() 258 int SCT_CTX_set1_pubkey(SCT_CTX *sctx, X509_PUBKEY *pubkey) in SCT_CTX_set1_pubkey() argument 260 EVP_PKEY *pkey = X509_PUBKEY_get(pubkey); in SCT_CTX_set1_pubkey() 265 if (!ct_public_key_hash(sctx, pubkey, &sctx->pkeyhash, &sctx->pkeyhashlen)) { in SCT_CTX_set1_pubkey()
|
/third_party/node/deps/openssl/openssl/providers/implementations/exchange/ |
H A D | ecx_exch.c | 150 if (s390x_x25519_mul(secret, ecxctx->peerkey->pubkey, in ecx_derive() 158 ecxctx->peerkey->pubkey) == 0) { in ecx_derive() 166 if (s390x_x448_mul(secret, ecxctx->peerkey->pubkey, in ecx_derive() 174 ecxctx->peerkey->pubkey) == 0) { in ecx_derive()
|
/third_party/openssl/providers/implementations/exchange/ |
H A D | ecx_exch.c | 150 if (s390x_x25519_mul(secret, ecxctx->peerkey->pubkey, in ecx_derive() 158 ecxctx->peerkey->pubkey) == 0) { in ecx_derive() 166 if (s390x_x448_mul(secret, ecxctx->peerkey->pubkey, in ecx_derive() 174 ecxctx->peerkey->pubkey) == 0) { in ecx_derive()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/ |
H A D | sae_pk.c | 444 wpabuf_free(pk->pubkey); in sae_deinit_pk() 502 pk->pubkey = crypto_ec_key_get_subject_public_key(pk->key); in sae_parse_pk() 503 if (!pk->pubkey) in sae_parse_pk() 547 const u8 *pubkey, size_t pubkey_len, u8 *hash) in sae_pk_hash_sig_data() 580 wpabuf_put_data(sig_data, pubkey, pubkey_len); in sae_pk_hash_sig_data() 645 wpabuf_len(pk->m), wpabuf_head(pk->pubkey), in sae_write_confirm_pk() 646 wpabuf_len(pk->pubkey), hash) < 0) in sae_write_confirm_pk() 658 need = 4 + wpabuf_len(pk->pubkey) + 3 + wpabuf_len(sig) + in sae_write_confirm_pk() 669 wpabuf_put_u8(buf, 2 + wpabuf_len(pk->pubkey)); in sae_write_confirm_pk() 672 wpabuf_put_buf(buf, pk->pubkey); in sae_write_confirm_pk() 545 sae_pk_hash_sig_data(struct sae_data *sae, size_t hash_len, bool ap, const u8 *m, size_t m_len, const u8 *pubkey, size_t pubkey_len, u8 *hash) sae_pk_hash_sig_data() argument [all...] |
/third_party/node/test/parallel/ |
H A D | test-tls-peer-certificate.js | 83 sha256(peerCert.pubkey).digest('hex'), 89 sha256(peerCert.pubkey).digest('base64'), 138 sha256(peerCert.pubkey).digest('hex'),
|