/third_party/openssl/crypto/ct/ |
D | ct_log.c | 29 EVP_PKEY *public_key; member 267 CTLOG *CTLOG_new_ex(EVP_PKEY *public_key, const char *name, OSSL_LIB_CTX *libctx, in CTLOG_new_ex() argument 292 if (ct_v1_log_id_from_pkey(ret, public_key) != 1) in CTLOG_new_ex() 295 ret->public_key = public_key; in CTLOG_new_ex() 302 CTLOG *CTLOG_new(EVP_PKEY *public_key, const char *name) in CTLOG_new() argument 304 return CTLOG_new_ex(public_key, name, NULL, NULL); in CTLOG_new() 312 EVP_PKEY_free(log->public_key); in CTLOG_free() 332 return log->public_key; in CTLOG_get0_public_key()
|
/third_party/rust/crates/rust-openssl/openssl/src/ |
D | ecdsa.rs | 157 EcKey::from_public_key(group, x.public_key()) in get_public_key() 165 let public_key = get_public_key(&group, &private_key).unwrap(); in sign_and_verify() localVariable 174 let verification = res.verify(data.as_bytes(), &public_key).unwrap(); in sign_and_verify() 179 .verify(String::from("hello2").as_bytes(), &public_key) in sign_and_verify() 193 let public_key = get_public_key(&group, &private_key).unwrap(); in check_private_components() localVariable 197 let verification = res.verify(data.as_bytes(), &public_key).unwrap(); in check_private_components() 204 let verification2 = res2.verify(data.as_bytes(), &public_key).unwrap(); in check_private_components() 213 let public_key = get_public_key(&group, &private_key).unwrap(); in serialize_deserialize() localVariable 221 let verification = sig.verify(data.as_bytes(), &public_key).unwrap(); in serialize_deserialize()
|
D | dh.rs | 202 pub fn public_key(&self) -> &BigNumRef { in public_key() function 217 pub fn compute_key(&self, public_key: &BigNumRef) -> Result<Vec<u8>, ErrorStack> { in compute_key() 223 public_key.as_ptr(), in compute_key() 366 assert_eq!(key1.public_key(), key2.public_key()); in test_dh_stored_restored() 392 let shared_a = dh1.compute_key(dh2.public_key()).unwrap(); in test_dh_generate_key_compute_key() 393 let shared_b = dh2.compute_key(dh1.public_key()).unwrap(); in test_dh_generate_key_compute_key() 411 let shared_a = dh1.compute_key(dh2.public_key()).unwrap(); in test_dh_generate_params_generate_key_compute_key() 412 let shared_b = dh2.compute_key(dh1.public_key()).unwrap(); in test_dh_generate_params_generate_key_compute_key()
|
D | ec.rs | 681 pub fn public_key(&self) -> &EcPointRef { in public_key() function 794 public_key: &EcPointRef, in from_public_key() 805 public_key.as_ptr(), in from_public_key() 901 public_key: &EcPointRef, in from_private_components() 919 public_key.as_ptr(), in from_private_components() 1109 let point = key.public_key(); in point_bytes() 1122 let point = key.public_key(); in point_owned() 1133 let mut public_key = EcPoint::new(&group).unwrap(); in mul_generator() localVariable 1134 public_key in mul_generator() 1137 assert!(public_key.eq(&group, key.public_key(), &mut ctx).unwrap()); in mul_generator() [all …]
|
D | envelope.rs | 163 let public_key = PKey::public_key_from_pem(public_pem).unwrap(); in public_encrypt_private_decrypt() localVariable 167 let mut seal = Seal::new(cipher, &[public_key]).unwrap(); in public_encrypt_private_decrypt()
|
D | rsa.rs | 718 let public_key = Rsa::public_key_from_pem(key).unwrap(); in test_public_encrypt_private_decrypt_with_padding() localVariable 720 let mut result = vec![0; public_key.size() as usize]; in test_public_encrypt_private_decrypt_with_padding() 722 let len = public_key in test_public_encrypt_private_decrypt_with_padding()
|
/third_party/openssl/crypto/x509/ |
D | x_pubkey.c | 33 ASN1_BIT_STRING *public_key; member 65 ASN1_SIMPLE(X509_PUBKEY, public_key, ASN1_BIT_STRING) 91 ASN1_BIT_STRING_free(pubkey->public_key); in x509_pubkey_ex_free() 105 && (pubkey->public_key != NULL in x509_pubkey_ex_populate() 106 || (pubkey->public_key = ASN1_BIT_STRING_new()) != NULL); in x509_pubkey_ex_populate() 290 || (pubkey->public_key = ASN1_BIT_STRING_new()) == NULL in X509_PUBKEY_dup() 291 || !ASN1_BIT_STRING_set(pubkey->public_key, in X509_PUBKEY_dup() 292 a->public_key->data, in X509_PUBKEY_dup() 293 a->public_key->length)) { in X509_PUBKEY_dup() 987 OPENSSL_free(pub->public_key->data); in X509_PUBKEY_set0_param() [all …]
|
/third_party/openssl/crypto/ec/curve448/ |
D | eddsa.c | 377 size_t message_len, const uint8_t public_key[57], in ossl_ed448_sign() 381 return ossl_c448_ed448_sign(ctx, out_sig, private_key, public_key, message, in ossl_ed448_sign() 388 const uint8_t signature[114], const uint8_t public_key[57], in ossl_ed448_verify() 391 return ossl_c448_ed448_verify(ctx, signature, public_key, message, in ossl_ed448_verify() 398 const uint8_t public_key[57], const uint8_t private_key[57], in ossl_ed448ph_sign() 401 return ossl_c448_ed448_sign_prehash(ctx, out_sig, private_key, public_key, in ossl_ed448ph_sign() 408 const uint8_t signature[114], const uint8_t public_key[57], in ossl_ed448ph_verify() 412 return ossl_c448_ed448_verify_prehash(ctx, signature, public_key, hash, in ossl_ed448ph_verify()
|
D | curve448_local.h | 15 const uint8_t public_key[57], const uint8_t private_key[57], 20 const uint8_t signature[114], const uint8_t public_key[57],
|
/third_party/openssl/include/crypto/ |
D | ecx.h | 98 const uint8_t public_key[32], const uint8_t private_key[32], 102 const uint8_t signature[64], const uint8_t public_key[32], 110 size_t message_len, const uint8_t public_key[57], 116 const uint8_t signature[114], const uint8_t public_key[57],
|
/third_party/mbedtls/tests/src/ |
D | psa_exercise_key.c | 510 uint8_t *public_key = NULL; in mbedtls_test_psa_key_agreement_with_self() local 523 ASSERT_ALLOC( public_key, public_key_length ); in mbedtls_test_psa_key_agreement_with_self() 524 PSA_ASSERT( psa_export_public_key( key, public_key, public_key_length, in mbedtls_test_psa_key_agreement_with_self() 529 public_key, public_key_length ); in mbedtls_test_psa_key_agreement_with_self() 537 mbedtls_free( public_key ); in mbedtls_test_psa_key_agreement_with_self() 550 uint8_t *public_key = NULL; in mbedtls_test_psa_raw_key_agreement_with_self() local 565 ASSERT_ALLOC( public_key, public_key_length ); in mbedtls_test_psa_raw_key_agreement_with_self() 567 public_key, public_key_length, in mbedtls_test_psa_raw_key_agreement_with_self() 571 public_key, public_key_length, in mbedtls_test_psa_raw_key_agreement_with_self() 589 mbedtls_free( public_key ); in mbedtls_test_psa_raw_key_agreement_with_self()
|
/third_party/openssl/crypto/cms/ |
D | cms_dh.c | 25 ASN1_INTEGER *public_key = NULL; in dh_cms_set_peerkey() local 50 if ((public_key = d2i_ASN1_INTEGER(NULL, &p, plen)) == NULL) in dh_cms_set_peerkey() 57 if ((bnpub = ASN1_INTEGER_to_BN(public_key, NULL)) == NULL) in dh_cms_set_peerkey() 73 ASN1_INTEGER_free(public_key); in dh_cms_set_peerkey()
|
/third_party/node/test/fixtures/0-dns/ |
D | create-cert.js | 17 const public_key = fs.readFileSync('./0-dns-rsapub.der'); constant 46 subjectPublicKey: { unused: 0, data: public_key} },
|
/third_party/ffmpeg/libavformat/tests/ |
D | rtmpdh.c | 68 static const char *public_key = variable 126 bn_hex2bn(dh->pub_key, public_key, ret); in test_ref_data()
|
/third_party/openssl/crypto/dsa/ |
D | dsa_ameth.c | 37 ASN1_INTEGER *public_key = NULL; in dsa_pub_decode() local 65 if ((public_key = d2i_ASN1_INTEGER(NULL, &p, pklen)) == NULL) { in dsa_pub_decode() 70 if ((dsa->pub_key = ASN1_INTEGER_to_BN(public_key, NULL)) == NULL) { in dsa_pub_decode() 76 ASN1_INTEGER_free(public_key); in dsa_pub_decode() 81 ASN1_INTEGER_free(public_key); in dsa_pub_decode()
|
/third_party/openssl/crypto/dh/ |
D | dh_ameth.c | 68 ASN1_INTEGER *public_key = NULL; in dh_pub_decode() local 90 if ((public_key = d2i_ASN1_INTEGER(NULL, &p, pklen)) == NULL) { in dh_pub_decode() 96 if ((dh->pub_key = ASN1_INTEGER_to_BN(public_key, NULL)) == NULL) { in dh_pub_decode() 101 ASN1_INTEGER_free(public_key); in dh_pub_decode() 106 ASN1_INTEGER_free(public_key); in dh_pub_decode()
|
/third_party/openssl/doc/man3/ |
D | CTLOG_new.pod | 14 CTLOG *CTLOG_new_ex(EVP_PKEY *public_key, const char *name, 16 CTLOG *CTLOG_new(EVP_PKEY *public_key, const char *name);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/wps/ |
D | wps_attr_parse.h | 66 const u8 *public_key; member
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/wps/ |
D | wps_attr_parse.h | 66 const u8 *public_key; member
|
D | wps_validate.c | 612 static int wps_validate_public_key(const u8 *public_key, size_t len, in wps_validate_public_key() argument 615 if (public_key == NULL) { in wps_validate_public_key() 1306 wps_validate_public_key(attr.public_key, attr.public_key_len, 1) || in wps_validate_m1() 1362 wps_validate_public_key(attr.public_key, attr.public_key_len, 1) || in wps_validate_m2()
|
/third_party/openssl/include/openssl/ |
D | ct.h.in | 429 * Creates a new CT log instance with the given |public_key| and |name| and 432 * Takes ownership of |public_key| but copies |name|. 433 * Returns NULL if malloc fails or if |public_key| cannot be converted to DER. 436 CTLOG *CTLOG_new_ex(EVP_PKEY *public_key, const char *name, OSSL_LIB_CTX *libctx, 443 CTLOG *CTLOG_new(EVP_PKEY *public_key, const char *name);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
D | x509v3.h | 63 u8 *public_key; member
|
D | x509v3.c | 56 os_free(cert->public_key); in x509_certificate_free() 276 os_free(cert->public_key); in x509_parse_public_key() 277 cert->public_key = os_memdup(pos + 1, hdr.length - 1); in x509_parse_public_key() 278 if (cert->public_key == NULL) { in x509_parse_public_key() 285 cert->public_key, cert->public_key_len); in x509_parse_public_key() 1791 pk = crypto_public_key_import(issuer->public_key, in x509_check_signature()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
D | x509v3.c | 56 os_free(cert->public_key); in x509_certificate_free() 270 os_free(cert->public_key); in x509_parse_public_key() 271 cert->public_key = os_memdup(pos + 1, hdr.length - 1); in x509_parse_public_key() 272 if (cert->public_key == NULL) { in x509_parse_public_key() 279 cert->public_key, cert->public_key_len); in x509_parse_public_key() 1861 pk = crypto_public_key_import(issuer->public_key, in x509_check_signature()
|
D | x509v3.h | 63 u8 *public_key; member
|