Searched refs:pub_key (Results 1 – 6 of 6) sorted by relevance
/openbmc/qemu/tests/unit/ |
H A D | test-crypto-akcipher.c | 679 const uint8_t *pub_key; member 793 .pub_key = rsa1024_public_key, 814 .pub_key = rsa1024_public_key, 838 .pub_key = rsa2048_public_key, 859 .pub_key = rsa2048_public_key, 882 QCryptoAkCipher *pub_key, *priv_key; in test_akcipher() local 887 pub_key = qcrypto_akcipher_new(&data->opt, in test_akcipher() 889 data->pub_key, data->pub_key_len, in test_akcipher() 891 g_assert(pub_key != NULL); in test_akcipher() 930 g_assert(qcrypto_akcipher_verify(pub_key, signature, data->slen, in test_akcipher() [all …]
|
/openbmc/linux/crypto/ |
H A D | ecrdsa.c | 43 struct ecc_point pub_key; member 95 !ctx->pub_key.x || in ecrdsa_verify() 98 ctx->pub_key.ndigits != ctx->curve->g.ndigits || in ecrdsa_verify() 138 ecc_point_mult_shamir(&cc, z1, &ctx->curve->g, z2, &ctx->pub_key, in ecrdsa_verify() 241 ctx->pub_key = ECC_POINT_INIT(ctx->_pubp[0], ctx->_pubp[1], ndigits); in ecrdsa_set_pub_key() 242 vli_from_le64(ctx->pub_key.x, ctx->key, ndigits); in ecrdsa_set_pub_key() 243 vli_from_le64(ctx->pub_key.y, ctx->key + ndigits * sizeof(u64), in ecrdsa_set_pub_key() 246 if (ecc_is_pubkey_valid_partial(ctx->curve, &ctx->pub_key)) in ecrdsa_set_pub_key() 260 return ctx->pub_key.ndigits * sizeof(u64); in ecrdsa_max_size()
|
H A D | ecdsa.c | 23 struct ecc_point pub_key; member 121 ecc_point_mult_shamir(&res, u1, &curve->g, u2, &ctx->pub_key, curve); in _ecdsa_verify() 212 ctx->pub_key = ECC_POINT_INIT(ctx->x, ctx->y, in ecdsa_ecc_ctx_reset() 245 ecc_swap_digits(digits, ctx->pub_key.x, ndigits); in ecdsa_set_pub_key() 246 ecc_swap_digits(&digits[ndigits], ctx->pub_key.y, ndigits); in ecdsa_set_pub_key() 247 ret = ecc_is_pubkey_valid_full(ctx->curve, &ctx->pub_key); in ecdsa_set_pub_key() 265 return ctx->pub_key.ndigits << ECC_DIGITS_TO_BYTES_SHIFT; in ecdsa_max_size()
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-connectivity/wvdial/wvstreams/ |
H A D | 0001-Forward-port-to-OpenSSL-1.1.x.patch | 122 - return BN_num_bytes(info->pub_key); 123 + const BIGNUM *pub_key = NULL; 124 + DH_get0_key(info, &pub_key, NULL); 125 + return BN_num_bytes(pub_key); 131 + const BIGNUM *pub_key = NULL; 132 + DH_get0_key(info, &pub_key, NULL); 134 + int key_len = BN_num_bytes(pub_key); 140 - BN_bn2bin(info->pub_key, foo); 141 + BN_bn2bin(pub_key, foo); 149 + const BIGNUM *pub_key = NULL; [all …]
|
/openbmc/u-boot/board/CZ.NIC/turris_mox/ |
H A D | turris_mox.c | 412 const char *pub_key; in mox_print_info() local 424 pub_key = mox_sp_get_ecdsa_public_key(); in mox_print_info() 425 if (pub_key) in mox_print_info() 426 printf(" ECDSA Public Key: %s\n", pub_key); in mox_print_info()
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/pam/pam-ssh-agent-auth/ |
H A D | 0001-Adapt-to-OpenSSL-1.1.1.patch | 116 pamsshagentauth_buffer_put_bignum2(b, key->dsa->pub_key); 272 if ((dsa->pub_key = BN_new()) == NULL) 339 BN_cmp(a->dsa->pub_key, b->dsa->pub_key) == 0; 460 (BN_copy(n->dsa->pub_key, k->dsa->pub_key) == NULL)) 504 pamsshagentauth_buffer_get_bignum2_ret(&b, key->dsa->pub_key) == -1) { 566 if ((pk->dsa->pub_key = BN_dup(k->dsa->pub_key)) == NULL)
|