Home
last modified time | relevance | path

Searched refs:pub_key (Results 1 – 6 of 6) sorted by relevance

/openbmc/qemu/tests/unit/
H A Dtest-crypto-akcipher.c679 const uint8_t *pub_key; member
793 .pub_key = rsa1024_public_key,
814 .pub_key = rsa1024_public_key,
838 .pub_key = rsa2048_public_key,
859 .pub_key = rsa2048_public_key,
882 QCryptoAkCipher *pub_key, *priv_key; in test_akcipher() local
887 pub_key = qcrypto_akcipher_new(&data->opt, in test_akcipher()
889 data->pub_key, data->pub_key_len, in test_akcipher()
891 g_assert(pub_key != NULL); in test_akcipher()
930 g_assert(qcrypto_akcipher_verify(pub_key, signature, data->slen, in test_akcipher()
[all …]
/openbmc/linux/crypto/
H A Decrdsa.c43 struct ecc_point pub_key; member
95 !ctx->pub_key.x || in ecrdsa_verify()
98 ctx->pub_key.ndigits != ctx->curve->g.ndigits || in ecrdsa_verify()
138 ecc_point_mult_shamir(&cc, z1, &ctx->curve->g, z2, &ctx->pub_key, in ecrdsa_verify()
241 ctx->pub_key = ECC_POINT_INIT(ctx->_pubp[0], ctx->_pubp[1], ndigits); in ecrdsa_set_pub_key()
242 vli_from_le64(ctx->pub_key.x, ctx->key, ndigits); in ecrdsa_set_pub_key()
243 vli_from_le64(ctx->pub_key.y, ctx->key + ndigits * sizeof(u64), in ecrdsa_set_pub_key()
246 if (ecc_is_pubkey_valid_partial(ctx->curve, &ctx->pub_key)) in ecrdsa_set_pub_key()
260 return ctx->pub_key.ndigits * sizeof(u64); in ecrdsa_max_size()
H A Decdsa.c23 struct ecc_point pub_key; member
121 ecc_point_mult_shamir(&res, u1, &curve->g, u2, &ctx->pub_key, curve); in _ecdsa_verify()
212 ctx->pub_key = ECC_POINT_INIT(ctx->x, ctx->y, in ecdsa_ecc_ctx_reset()
245 ecc_swap_digits(digits, ctx->pub_key.x, ndigits); in ecdsa_set_pub_key()
246 ecc_swap_digits(&digits[ndigits], ctx->pub_key.y, ndigits); in ecdsa_set_pub_key()
247 ret = ecc_is_pubkey_valid_full(ctx->curve, &ctx->pub_key); in ecdsa_set_pub_key()
265 return ctx->pub_key.ndigits << ECC_DIGITS_TO_BYTES_SHIFT; in ecdsa_max_size()
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-connectivity/wvdial/wvstreams/
H A D0001-Forward-port-to-OpenSSL-1.1.x.patch122 - return BN_num_bytes(info->pub_key);
123 + const BIGNUM *pub_key = NULL;
124 + DH_get0_key(info, &pub_key, NULL);
125 + return BN_num_bytes(pub_key);
131 + const BIGNUM *pub_key = NULL;
132 + DH_get0_key(info, &pub_key, NULL);
134 + int key_len = BN_num_bytes(pub_key);
140 - BN_bn2bin(info->pub_key, foo);
141 + BN_bn2bin(pub_key, foo);
149 + const BIGNUM *pub_key = NULL;
[all …]
/openbmc/u-boot/board/CZ.NIC/turris_mox/
H A Dturris_mox.c412 const char *pub_key; in mox_print_info() local
424 pub_key = mox_sp_get_ecdsa_public_key(); in mox_print_info()
425 if (pub_key) in mox_print_info()
426 printf(" ECDSA Public Key: %s\n", pub_key); in mox_print_info()
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/pam/pam-ssh-agent-auth/
H A D0001-Adapt-to-OpenSSL-1.1.1.patch116 pamsshagentauth_buffer_put_bignum2(b, key->dsa->pub_key);
272 if ((dsa->pub_key = BN_new()) == NULL)
339 BN_cmp(a->dsa->pub_key, b->dsa->pub_key) == 0;
460 (BN_copy(n->dsa->pub_key, k->dsa->pub_key) == NULL))
504 pamsshagentauth_buffer_get_bignum2_ret(&b, key->dsa->pub_key) == -1) {
566 if ((pk->dsa->pub_key = BN_dup(k->dsa->pub_key)) == NULL)