Searched refs:pub_key (Results 1 – 3 of 3) sorted by relevance
/crypto/ |
D | ecrdsa.c | 43 struct ecc_point pub_key; member 95 !ctx->pub_key.x || in ecrdsa_verify() 98 ctx->pub_key.ndigits != ctx->curve->g.ndigits || in ecrdsa_verify() 138 ecc_point_mult_shamir(&cc, z1, &ctx->curve->g, z2, &ctx->pub_key, in ecrdsa_verify() 241 ctx->pub_key = ECC_POINT_INIT(ctx->_pubp[0], ctx->_pubp[1], ndigits); in ecrdsa_set_pub_key() 242 vli_from_le64(ctx->pub_key.x, ctx->key, ndigits); in ecrdsa_set_pub_key() 243 vli_from_le64(ctx->pub_key.y, ctx->key + ndigits * sizeof(u64), in ecrdsa_set_pub_key() 246 if (ecc_is_pubkey_valid_partial(ctx->curve, &ctx->pub_key)) in ecrdsa_set_pub_key() 260 return ctx->pub_key.ndigits * sizeof(u64); in ecrdsa_max_size()
|
D | ecdsa.c | 23 struct ecc_point pub_key; member 121 ecc_point_mult_shamir(&res, u1, &curve->g, u2, &ctx->pub_key, curve); in _ecdsa_verify() 212 ctx->pub_key = ECC_POINT_INIT(ctx->x, ctx->y, in ecdsa_ecc_ctx_reset() 245 ecc_swap_digits(digits, ctx->pub_key.x, ndigits); in ecdsa_set_pub_key() 246 ecc_swap_digits(&digits[ndigits], ctx->pub_key.y, ndigits); in ecdsa_set_pub_key() 247 ret = ecc_is_pubkey_valid_full(ctx->curve, &ctx->pub_key); in ecdsa_set_pub_key() 265 return ctx->pub_key.ndigits << ECC_DIGITS_TO_BYTES_SHIFT; in ecdsa_max_size()
|
/crypto/asymmetric_keys/ |
D | asym_tpm.c | 339 static uint32_t derive_pub_key(const void *pub_key, uint32_t len, uint8_t *buf) in derive_pub_key() argument 351 memcpy(cur + 1, pub_key, len); in derive_pub_key() 412 der_pub_key_len = derive_pub_key(tk->pub_key, tk->pub_key_len, in tpm_key_query() 466 der_pub_key_len = derive_pub_key(tk->pub_key, tk->pub_key_len, in tpm_key_encrypt() 761 der_pub_key_len = derive_pub_key(tk->pub_key, tk->pub_key_len, in tpm_key_verify_signature() 817 const void *pub_key; in extract_key_parameters() local 888 pub_key = cur + 4; in extract_key_parameters() 891 tk->pub_key = pub_key; in extract_key_parameters()
|