/openssl-master/test/ |
A D | ffc_internal_test.c | 444 BIGNUM *pub = NULL; in ffc_public_validate_test() local 447 if (!TEST_ptr(pub = BN_new())) in ffc_public_validate_test() 454 if (!TEST_true(BN_set_word(pub, 1))) in ffc_public_validate_test() 456 BN_set_negative(pub, 1); in ffc_public_validate_test() 462 if (!TEST_true(BN_set_word(pub, 0))) in ffc_public_validate_test() 476 if (!TEST_true(BN_add_word(pub, 2))) in ffc_public_validate_test() 482 if (!TEST_ptr(BN_copy(pub, params->p))) in ffc_public_validate_test() 490 if (!TEST_true(BN_sub_word(pub, 1))) in ffc_public_validate_test() 498 if (!TEST_true(BN_sub_word(pub, 1))) in ffc_public_validate_test() 506 if (!TEST_true(BN_sub_word(pub, 5))) in ffc_public_validate_test() [all …]
|
A D | dhtest.c | 243 BIGNUM *p = NULL, *q = NULL, *g = NULL, *pub = NULL, *priv = NULL; in dh_computekey_range_test() local 256 || !TEST_ptr(pub = BN_new()) in dh_computekey_range_test() 264 if (!TEST_true(BN_set_word(pub, 1))) in dh_computekey_range_test() 270 if (!TEST_int_le(ossl_dh_compute_key(buf, pub, dh), 0)) in dh_computekey_range_test() 273 if (!TEST_ptr(BN_copy(pub, DH_get0_p(dh))) in dh_computekey_range_test() 274 || !TEST_int_le(ossl_dh_compute_key(buf, pub, dh), 0)) in dh_computekey_range_test() 277 if (!TEST_true(BN_sub_word(pub, 1)) in dh_computekey_range_test() 278 || !TEST_int_le(ossl_dh_compute_key(buf, pub, dh), 0)) in dh_computekey_range_test() 281 if (!TEST_true(BN_sub_word(pub, 1)) in dh_computekey_range_test() 282 || !TEST_int_eq(ossl_dh_compute_key(buf, pub, dh), sz)) in dh_computekey_range_test() [all …]
|
A D | evp_libctx_test.c | 497 static int rsa_keygen(int bits, EVP_PKEY **pub, EVP_PKEY **priv) in rsa_keygen() argument 514 if (!TEST_ptr(d2i_PublicKey(EVP_PKEY_RSA, pub, &pp, len))) in rsa_keygen() 526 EVP_PKEY *pub = NULL; in kem_rsa_gen_recover() local 535 ret = TEST_true(rsa_keygen(bits, &pub, &priv)) in kem_rsa_gen_recover() 536 && TEST_ptr(sctx = EVP_PKEY_CTX_new_from_pkey(libctx, pub, NULL)) in kem_rsa_gen_recover() 554 EVP_PKEY_free(pub); in kem_rsa_gen_recover() 592 EVP_PKEY *pub = NULL; in kem_rsa_params() local 599 ret = TEST_true(rsa_keygen(2048, &pub, &priv)) in kem_rsa_params() 600 && TEST_ptr(pubctx = EVP_PKEY_CTX_new_from_pkey(libctx, pub, NULL)) in kem_rsa_params() 654 EVP_PKEY_free(pub); in kem_rsa_params()
|
A D | acvp_test.c | 374 unsigned char *priv = NULL, *pub = NULL; in dsa_keygen_test() local 390 test_output_memory("y", pub, pub_len); in dsa_keygen_test() 394 OPENSSL_free(pub); in dsa_keygen_test() 396 pub = priv = NULL; in dsa_keygen_test() 401 OPENSSL_free(pub); in dsa_keygen_test() 497 if (pub != NULL) { in dsa_create_pkey() 499 || !TEST_ptr(BN_bin2bn(pub, pub_len, pub_bn)) in dsa_create_pkey() 912 if (pub != NULL) { in dh_create_pkey() 948 unsigned char *pub = NULL; in dh_safe_prime_keygen_test() local 968 test_output_memory("y", pub, pub_len); in dh_safe_prime_keygen_test() [all …]
|
A D | evp_pkey_provided_test.c | 464 BIGNUM *pub = NULL, *priv = NULL; in test_fromdata_dh_named_group() local 510 || !TEST_ptr(pub = BN_bin2bn(pub_data, sizeof(pub_data), NULL)) in test_fromdata_dh_named_group() 578 || !TEST_BN_eq(pub, pub_out) in test_fromdata_dh_named_group() 654 BN_free(pub); in test_fromdata_dh_named_group() 675 BIGNUM *pub = NULL, *priv = NULL; in test_fromdata_dh_fips186_4() local 758 || !TEST_BN_eq(pub, pub_out) in test_fromdata_dh_fips186_4() 829 BN_free(pub); in test_fromdata_dh_fips186_4() 1345 BIGNUM *pub = NULL, *priv = NULL; in test_fromdata_dsa_fips186_4() local 1478 pub)) in test_fromdata_dsa_fips186_4() 1507 || !TEST_BN_eq(pub, pub_out) in test_fromdata_dsa_fips186_4() [all …]
|
A D | evp_extra_test.c | 748 || !TEST_ptr(pub = BN_new()) in test_EVP_PKEY_ffc_priv_pub() 824 BN_free(pub); in test_EVP_PKEY_ffc_priv_pub() 1961 char *pub; member 2005 if (pub && keys[tst].pub == NULL) in test_set_get_raw_keys_int() 2010 if (pub) { in test_set_get_raw_keys_int() 2012 inlen = strlen(keys[tst].pub); in test_set_get_raw_keys_int() 2013 in = (unsigned char *)keys[tst].pub; in test_set_get_raw_keys_int() 2524 || !TEST_ptr(pub = BN_new()) in test_DSA_get_set_params() 2556 BN_free(pub); in test_DSA_get_set_params() 2707 unsigned char pub[2048 / 8]; in test_EVP_PKEY_set1_DH() local [all …]
|
/openssl-master/test/recipes/30-test_evp_data/ |
A D | evppkey_ffdhe.txt | 47 PublicKey=ffdhe2048-1-pub 63 PublicKey=ffdhe2048-2-pub 84 PeerKey=ffdhe2048-2-pub 88 PeerKey=ffdhe2048-1-pub 92 PeerKey=ffdhe2048-2-pub 124 PublicKey=ffdhe3072-1-pub 171 PeerKey=ffdhe3072-2-pub 175 PeerKey=ffdhe3072-1-pub 271 PeerKey=ffdhe4096-2-pub 275 PeerKey=ffdhe4096-1-pub [all …]
|
/openssl-master/include/crypto/ |
A D | asn1.h | 29 int (*pub_decode) (EVP_PKEY *pk, const X509_PUBKEY *pub); 30 int (*pub_encode) (X509_PUBKEY *pub, const EVP_PKEY *pk); 73 int (*set_pub_key) (EVP_PKEY *pk, const unsigned char *pub, size_t len); 75 int (*get_pub_key) (const EVP_PKEY *pk, unsigned char *pub, size_t *len);
|
/openssl-master/crypto/dh/ |
A D | dh_backend.c | 108 const BIGNUM *priv = NULL, *pub = NULL; in ossl_dh_key_todata() local 113 DH_get0_key(dh, &pub, &priv); in ossl_dh_key_todata() 117 if (pub != NULL in ossl_dh_key_todata() 118 && !ossl_param_build_set_bn(bld, params, OSSL_PKEY_PARAM_PUB_KEY, pub)) in ossl_dh_key_todata()
|
/openssl-master/apps/ |
A D | testdsa.h | 191 unsigned char *pub; member 205 st.pub = dsa##bits##_pub; \ 243 pub_key = BN_bin2bn(dsa_t.pub, dsa_t.pub_l, NULL); in get_dsa()
|
/openssl-master/providers/implementations/signature/ |
A D | eddsa_sig.c | 409 unsigned char pub[32]; in s390x_ed25519_digestverify() member 417 s390x_flip_endian32(param.ed25519.pub, edkey->pubkey); in s390x_ed25519_digestverify() 431 unsigned char pub[64]; in s390x_ed448_digestverify() member 441 memcpy(param.ed448.pub, edkey->pubkey, 57); in s390x_ed448_digestverify() 442 s390x_flip_endian64(param.ed448.pub, param.ed448.pub); in s390x_ed448_digestverify()
|
/openssl-master/crypto/x509/ |
A D | x_pubkey.c | 980 int X509_PUBKEY_set0_param(X509_PUBKEY *pub, ASN1_OBJECT *aobj, in X509_PUBKEY_set0_param() argument 984 if (!X509_ALGOR_set0(pub->algor, aobj, ptype, pval)) in X509_PUBKEY_set0_param() 987 OPENSSL_free(pub->public_key->data); in X509_PUBKEY_set0_param() 988 pub->public_key->data = penc; in X509_PUBKEY_set0_param() 989 pub->public_key->length = penclen; in X509_PUBKEY_set0_param() 992 pub->public_key->flags |= ASN1_STRING_FLAG_BITS_LEFT; in X509_PUBKEY_set0_param() 999 X509_ALGOR **pa, const X509_PUBKEY *pub) in X509_PUBKEY_get0_param() argument 1002 *ppkalg = pub->algor->algorithm; in X509_PUBKEY_get0_param() 1004 *pk = pub->public_key->data; in X509_PUBKEY_get0_param() 1005 *ppklen = pub->public_key->length; in X509_PUBKEY_get0_param() [all …]
|
/openssl-master/crypto/ct/ |
A D | ct_sct.c | 294 X509_PUBKEY *pub = NULL, *log_pkey = NULL; in SCT_validate() local 334 if (X509_PUBKEY_set(&pub, issuer_pkey) != 1) in SCT_validate() 336 if (SCT_CTX_set1_issuer_pubkey(sctx, pub) != 1) in SCT_validate() 369 X509_PUBKEY_free(pub); in SCT_validate()
|
/openssl-master/doc/man7/ |
A D | EVP_PKEY-X25519.pod | 13 support the associated key, containing the public key I<pub> and the 33 =item "pub" (B<OSSL_PKEY_PARAM_PUB_KEY>) <octet string> 41 =item "encoded-pub-key" (B<OSSL_PKEY_PARAM_ENCODED_PUBLIC_KEY>) <octet string>
|
/openssl-master/crypto/ec/ |
A D | ecx_meth.c | 280 static int ecx_set_pub_key(EVP_PKEY *pkey, const unsigned char *pub, size_t len) in ecx_set_pub_key() argument 288 ecx = ossl_ecx_key_op(NULL, pub, len, pkey->ameth->pkey_id, in ecx_set_pub_key() 319 static int ecx_get_pub_key(const EVP_PKEY *pkey, unsigned char *pub, in ecx_get_pub_key() argument 324 if (pub == NULL) { in ecx_get_pub_key() 334 memcpy(pub, key->pubkey, *len); in ecx_get_pub_key() 1259 unsigned char pub[32]; in s390x_pkey_ecd_digestverify25519() member 1271 s390x_flip_endian32(param.ed25519.pub, edkey->pubkey); in s390x_pkey_ecd_digestverify25519() 1286 unsigned char pub[64]; in s390x_pkey_ecd_digestverify448() member 1300 memcpy(param.ed448.pub, edkey->pubkey, 57); in s390x_pkey_ecd_digestverify448() 1301 s390x_flip_endian64(param.ed448.pub, param.ed448.pub); in s390x_pkey_ecd_digestverify448()
|
/openssl-master/doc/man3/ |
A D | X509_PUBKEY_new.pod | 35 int X509_PUBKEY_set0_param(X509_PUBKEY *pub, ASN1_OBJECT *aobj, 40 X509_ALGOR **pa, const X509_PUBKEY *pub); 88 X509_PUBKEY_set0_param() sets the public key parameters of I<pub>. The 93 parameters is passed to I<pub> so they must not be freed after the 96 X509_PUBKEY_get0_param() retrieves the public key parameters from I<pub>,
|
A D | EVP_PKEY_gettable_params.pod | 85 unsigned char pub[256]; 98 pub, sizeof(pub), &len)) {
|
/openssl-master/crypto/asn1/ |
A D | ameth_lib.c | 285 const X509_PUBKEY *pub), in EVP_PKEY_asn1_set_public() argument 286 int (*pub_encode) (X509_PUBKEY *pub, in EVP_PKEY_asn1_set_public() 418 const unsigned char *pub, in EVP_PKEY_asn1_set_set_pub_key() argument 434 unsigned char *pub, in EVP_PKEY_asn1_set_get_pub_key() argument
|
/openssl-master/test/recipes/30-test_evp_pkey_provided/ |
A D | ED25519.pub.txt | 2 pub:
|
A D | X25519.pub.txt | 2 pub:
|
A D | X448.pub.txt | 2 pub:
|
A D | ED448.pub.txt | 2 pub:
|
A D | EC.pub.txt | 2 pub:
|
A D | ED25519.priv.txt | 6 pub:
|
A D | X25519.priv.txt | 6 pub:
|