/openssl/demos/signature/ |
H A D | EVP_ED_Signature_demo.c | 28 static int demo_sign(EVP_PKEY *priv, in demo_sign() argument 131 EVP_PKEY *priv = NULL, *pub = NULL; in create_key() local 140 priv = EVP_PKEY_Q_keygen(libctx, NULL, "ED25519"); in create_key() 141 if (priv == NULL) { in create_key() 146 if (!EVP_PKEY_get_octet_string_param(priv, in create_key() 163 *privout = priv; in create_key() 165 EVP_PKEY_free(priv); in create_key() 176 EVP_PKEY *priv = NULL, *pub = NULL; in main() local 183 if (!create_key(libctx, &priv, &pub)) { in main() 188 if (!demo_sign(priv, hamlet, sizeof(hamlet), libctx, in main() [all …]
|
/openssl/test/ |
H A D | ffc_internal_test.c | 543 BIGNUM *priv = NULL; in ffc_private_validate_test() local 546 if (!TEST_ptr(priv = BN_new())) in ffc_private_validate_test() 553 if (!TEST_true(BN_set_word(priv, 1))) in ffc_private_validate_test() 555 BN_set_negative(priv, 1); in ffc_private_validate_test() 562 if (!TEST_true(BN_set_word(priv, 0))) in ffc_private_validate_test() 575 if (!TEST_ptr(BN_copy(priv, params->q))) in ffc_private_validate_test() 583 if (!TEST_true(BN_sub_word(priv, 1))) in ffc_private_validate_test() 602 BN_free(priv); in ffc_private_validate_test() 610 BIGNUM *priv = NULL; in ffc_private_gen_test() local 617 if (!TEST_ptr(priv = BN_new())) in ffc_private_gen_test() [all …]
|
H A D | ml_dsa_test.c | 61 if (priv != NULL) { in ml_dsa_create_keypair() 97 priv, sizeof(priv), &priv_len)) in ml_dsa_keygen_test() 101 || !TEST_mem_eq(priv, priv_len, tst->priv, tst->priv_len) in ml_dsa_keygen_test() 315 uint8_t *priv = NULL, *pub = NULL; in ml_dsa_keygen_drbg_test() local 339 OPENSSL_free(priv); in ml_dsa_keygen_drbg_test() 504 uint8_t *priv = OPENSSL_memdup(td->priv, td->priv_len); in ml_dsa_priv_pub_bad_t0_test() local 506 if (!TEST_ptr(priv)) in ml_dsa_priv_pub_bad_t0_test() 508 memcpy(priv, td->priv, td->priv_len); in ml_dsa_priv_pub_bad_t0_test() 513 priv[td->priv_len - 6 * 416] ^= 1; in ml_dsa_priv_pub_bad_t0_test() 518 priv[td->priv_len - 6 * 416] ^= 1; in ml_dsa_priv_pub_bad_t0_test() [all …]
|
H A D | sm2_internal_test.c | 141 BIGNUM *priv = NULL; in test_sm2_crypt() local 153 || !TEST_true(BN_hex2bn(&priv, privkey_hex))) in test_sm2_crypt() 159 || !TEST_true(EC_KEY_set_private_key(key, priv))) in test_sm2_crypt() 164 || !TEST_true(EC_POINT_mul(group, pt, priv, NULL, NULL, NULL)) in test_sm2_crypt() 200 BN_free(priv); in test_sm2_crypt() 313 BIGNUM *priv = NULL; in test_sm2_sign() local 322 if (!TEST_true(BN_hex2bn(&priv, privkey_hex))) in test_sm2_sign() 328 || !TEST_true(EC_KEY_set_private_key(key, priv))) in test_sm2_sign() 334 || !TEST_true(EC_POINT_mul(group, pt, priv, NULL, NULL, NULL)) in test_sm2_sign() 366 BN_free(priv); in test_sm2_sign()
|
H A D | dsatest.c | 332 BIGNUM *p = NULL, *q = NULL, *g = NULL, *priv = NULL, *pub = NULL, *priv2 = NULL; in test_dsa_sig_infinite_loop() local 358 || !TEST_ptr(priv = BN_bin2bn(out_priv, sizeof(out_priv), NULL)) in test_dsa_sig_infinite_loop() 359 || !TEST_ptr(priv2 = BN_dup(priv)) in test_dsa_sig_infinite_loop() 371 if (!TEST_true(DSA_set0_key(dsa, pub, priv))) in test_dsa_sig_infinite_loop() 373 pub = priv = NULL; in test_dsa_sig_infinite_loop() 410 BN_free(priv); in test_dsa_sig_infinite_loop() 423 BIGNUM *p = NULL, *q = NULL, *g = NULL, *priv = NULL, *pub = NULL; in test_dsa_sig_neg_param() local 447 || !TEST_ptr(priv = BN_bin2bn(out_priv, sizeof(out_priv), NULL)) in test_dsa_sig_neg_param() 455 if (!TEST_true(DSA_set0_key(dsa, pub, priv))) in test_dsa_sig_neg_param() 457 pub = priv = NULL; in test_dsa_sig_neg_param() [all …]
|
H A D | slh_dsa_test.c | 56 const uint8_t *priv, size_t priv_len, in slh_dsa_create_keypair() argument 264 if (!slh_dsa_create_keypair(&pkey, td->alg, td->priv, td->priv_len, in slh_dsa_sign_verify_test() 325 uint8_t priv[32 * 2], pub[32 * 2]; in slh_dsa_keygen_test() local 331 if (!TEST_ptr(pkey = do_gen_key(tst->name, tst->priv, key_len + n))) in slh_dsa_keygen_test() 335 priv, sizeof(priv), &priv_len))) in slh_dsa_keygen_test() 354 if (!TEST_mem_eq(pub, pub_len, tst->priv + key_len, key_len)) in slh_dsa_keygen_test() 369 EVP_PKEY *gkey = NULL, *pub = NULL, *priv = NULL; in slh_dsa_usage_test() local 422 EVP_PKEY_free(priv); in slh_dsa_usage_test() 439 EVP_PKEY *gkey = NULL, *pub = NULL, *priv = NULL; in slh_dsa_deterministic_usage_test() local 452 if (!TEST_ptr(gkey = do_gen_key(tst->name, tst->priv, key_len + n))) in slh_dsa_deterministic_usage_test() [all …]
|
H A D | evp_pkey_dhkem_test.c | 123 BIGNUM *priv = NULL; in test_ec_dhkem_derivekey_fail() local 161 BN_free(priv); in test_ec_dhkem_derivekey_fail() 272 EVP_PKEY *priv = NULL; in test_ec_invalid_private_key() local 285 EVP_PKEY_free(priv); in test_ec_invalid_private_key() 397 EVP_PKEY *priv = NULL; in test_nopublic() local 422 EVP_PKEY_free(priv); in test_nopublic() 475 BIGNUM *priv = NULL; in test_ec_dhkem_derivekey() local 491 &priv)) in test_ec_dhkem_derivekey() 492 && TEST_int_gt(privkeylen = BN_bn2bin(priv, privkey), 0) in test_ec_dhkem_derivekey() 497 BN_free(priv); in test_ec_dhkem_derivekey() [all …]
|
H A D | evp_libctx_test.c | 544 static int rsa_keygen(int bits, EVP_PKEY **pub, EVP_PKEY **priv) in rsa_keygen() argument 552 if (!TEST_ptr(*priv = EVP_PKEY_Q_keygen(libctx, NULL, "RSA", (size_t)bits)) in rsa_keygen() 554 OSSL_ENCODER_CTX_new_for_pkey(*priv, in rsa_keygen() 574 EVP_PKEY *priv = NULL; in kem_rsa_gen_recover() local 582 ret = TEST_true(rsa_keygen(bits, &pub, &priv)) in kem_rsa_gen_recover() 595 && TEST_ptr(rctx = EVP_PKEY_CTX_new_from_pkey(libctx, priv, NULL)) in kem_rsa_gen_recover() 619 EVP_PKEY_free(priv); in kem_rsa_gen_recover() 662 EVP_PKEY *priv = NULL; in kem_rsa_params() local 668 ret = TEST_true(rsa_keygen(2048, &pub, &priv)) in kem_rsa_params() 670 && TEST_ptr(privctx = EVP_PKEY_CTX_new_from_pkey(libctx, priv, NULL)) in kem_rsa_params() [all …]
|
/openssl/crypto/ml_dsa/ |
H A D | ml_dsa_sign.c | 56 const ML_DSA_PARAMS *params = priv->params; in ml_dsa_sign_internal() 111 if (!matrix_expand_A(md_ctx, priv->shake128_md, priv->rho, &a_ntt)) in ml_dsa_sign_internal() 118 if (!shake_xof_2(md_ctx, priv->shake256_md, priv->tr, sizeof(priv->tr), in ml_dsa_sign_internal() 122 if (!shake_xof_3(md_ctx, priv->shake256_md, priv->K, sizeof(priv->K), in ml_dsa_sign_internal() 127 vector_copy(&s1_ntt, &priv->s1); in ml_dsa_sign_internal() 129 vector_copy(&s2_ntt, &priv->s2); in ml_dsa_sign_internal() 131 vector_copy(&t0_ntt, &priv->t0); in ml_dsa_sign_internal() 367 int ossl_ml_dsa_sign(const ML_DSA_KEY *priv, int msg_is_mu, in ossl_ml_dsa_sign() argument 377 if (ossl_ml_dsa_key_get_priv(priv) == NULL) in ossl_ml_dsa_sign() 380 if (sig_size < priv->params->sig_len) in ossl_ml_dsa_sign() [all …]
|
/openssl/crypto/slh_dsa/ |
H A D | slh_dsa_key.h | 13 #define SLH_DSA_SK_SEED(key) ((key)->priv) 14 #define SLH_DSA_SK_PRF(key) ((key)->priv + (key)->params->n) 15 #define SLH_DSA_PK_SEED(key) ((key)->priv + (key)->params->n * 2) 16 #define SLH_DSA_PK_ROOT(key) ((key)->priv + (key)->params->n * 3) 31 uint8_t priv[4 * SLH_DSA_MAX_N]; member
|
H A D | slh_dsa_key.c | 123 OPENSSL_cleanse(&key->priv, sizeof(key->priv) >> 1); in ossl_slh_dsa_key_free() 198 if (memcmp(key1->priv, key2->priv, in ossl_slh_dsa_key_equal() 266 p = key->priv; in ossl_slh_dsa_key_fromdata() 298 OPENSSL_cleanse(key->priv, priv_len); in ossl_slh_dsa_key_fromdata() 356 uint8_t *priv = SLH_DSA_PRIV(out); in ossl_slh_dsa_generate_key() local 362 memcpy(priv, entropy, entropy_len_expected); in ossl_slh_dsa_generate_key() 364 if (RAND_priv_bytes_ex(lib_ctx, priv, secret_key_len, 0) <= 0 in ossl_slh_dsa_generate_key() 376 OPENSSL_cleanse(priv, secret_key_len); in ossl_slh_dsa_generate_key() 410 return key->has_priv ? key->priv : NULL; in ossl_slh_dsa_key_get_priv() 441 int ossl_slh_dsa_set_priv(SLH_DSA_KEY *key, const uint8_t *priv, size_t priv_len) in ossl_slh_dsa_set_priv() argument [all …]
|
H A D | slh_dsa.c | 48 const SLH_DSA_KEY *priv = hctx->key; in slh_sign_internal() local 49 const SLH_DSA_PARAMS *params = priv->params; in slh_sign_internal() 64 SLH_HASH_FUNC_DECLARE(priv, hashf); in slh_sign_internal() 65 SLH_ADRS_FUNC_DECLARE(priv, adrsf); in slh_sign_internal() 78 if (priv->has_priv == 0) { in slh_sign_internal() 88 pk_seed = SLH_DSA_PK_SEED(priv); in slh_sign_internal() 89 sk_seed = SLH_DSA_SK_SEED(priv); in slh_sign_internal() 97 if (!hashf->PRF_MSG(hctx, SLH_DSA_SK_PRF(priv), opt_rand, msg, msg_len, wpkt) in slh_sign_internal() 99 || !hashf->H_MSG(hctx, r, pk_seed, SLH_DSA_PK_ROOT(priv), msg, msg_len, in slh_sign_internal()
|
/openssl/crypto/ec/ |
H A D | ecx_key.c | 110 int ossl_ecx_compute_key(ECX_KEY *peer, ECX_KEY *priv, size_t keylen, in ossl_ecx_compute_key() argument 113 if (priv == NULL in ossl_ecx_compute_key() 114 || priv->privkey == NULL in ossl_ecx_compute_key() 139 if (s390x_x25519_mul(secret, peer->pubkey, priv->privkey) == 0) { in ossl_ecx_compute_key() 145 if (ossl_x25519(secret, priv->privkey, peer->pubkey) == 0) { in ossl_ecx_compute_key() 153 if (s390x_x448_mul(secret, peer->pubkey, priv->privkey) == 0) { in ossl_ecx_compute_key() 159 if (ossl_x448(secret, priv->privkey, peer->pubkey) == 0) { in ossl_ecx_compute_key()
|
/openssl/demos/keyexch/ |
H A D | ecdh.c | 30 EVP_PKEY *priv; /* private keypair */ member 50 if (!EVP_PKEY_get_octet_string_param(peer->priv, OSSL_PKEY_PARAM_PUB_KEY, in get_peer_public_key() 87 || EVP_PKEY_generate(ctx, &peer->priv) <= 0 in create_peer() 89 EVP_PKEY_free(peer->priv); in create_peer() 90 peer->priv = NULL; in create_peer() 101 EVP_PKEY_free(peer->priv); in destroy_peer() 113 derivectx = EVP_PKEY_CTX_new_from_pkey(libctx, peerA->priv, NULL); in generate_secret()
|
/openssl/crypto/ffc/ |
H A D | ffc_key_generate.c | 23 int N, int s, BIGNUM *priv) in ossl_ffc_generate_private_key() argument 48 if (!BN_priv_rand_range_ex(priv, two_powN, 0, ctx) in ossl_ffc_generate_private_key() 49 || !BN_add_word(priv, 1)) in ossl_ffc_generate_private_key() 52 if (BN_cmp(priv, m) < 0) in ossl_ffc_generate_private_key()
|
H A D | ffc_key_validate.c | 102 int ossl_ffc_validate_private_key(const BIGNUM *upper, const BIGNUM *priv, in ossl_ffc_validate_private_key() argument 109 if (priv == NULL || upper == NULL) { in ossl_ffc_validate_private_key() 113 if (BN_cmp(priv, BN_value_one()) < 0) { in ossl_ffc_validate_private_key() 117 if (BN_cmp(priv, upper) >= 0) { in ossl_ffc_validate_private_key()
|
/openssl/doc/man7/ |
H A D | EVP_PKEY-ML-DSA.pod | 17 and the private key I<priv>. 123 =item C<seed-priv>: 146 =item C<priv-only>: 169 =item C<bare-priv>: 192 The default order is equivalent to C<seed-priv> first and C<priv-only> second, with 226 uint8_t pub[2592], priv[4896], seed[32]: 232 priv, sizeof(priv), &priv_len); 240 -in seed-only.pem -out priv-only.pem 251 -in seed-priv.pem -out priv-only.pem 265 input_formats = seed-priv, seed-only, priv-only [all …]
|
H A D | EVP_PKEY-ML-KEM.pod | 80 =item "priv" (B<OSSL_PKEY_PARAM_PRIV_KEY>) <octet string> 143 =item C<seed-priv>: 166 =item C<priv-only>: 189 =item C<bare-priv>: 212 The default order is equivalent to C<seed-priv> first and C<priv-only> second, with 217 If C<priv-only> is listed first, then just the key is output regardless of 247 -in seed-only.pem -out priv-only.pem 252 -algorithm ml-kem-768 -out priv-only.pem 258 -in seed-priv.pem -out priv-only.pem 272 input_formats = seed-priv, seed-only, priv-only [all …]
|
H A D | EVP_PKEY-SLH-DSA.pod | 24 private key I<priv>. 68 =item "priv" (B<OSSL_PKEY_PARAM_PRIV_KEY>) <octet string> 95 uint8_t priv[64], pub[64]; 99 priv, sizeof(priv), &priv_len);
|
/openssl/crypto/evp/ |
H A D | p_dec.c | 22 EVP_PKEY *priv) in EVP_PKEY_decrypt_old() argument 27 if (EVP_PKEY_get_id(priv) != EVP_PKEY_RSA) { in EVP_PKEY_decrypt_old() 32 rsa = evp_pkey_get0_RSA_int(priv); in EVP_PKEY_decrypt_old()
|
H A D | p_open.c | 20 EVP_PKEY *priv) in EVP_OpenInit() argument 33 if (priv == NULL) in EVP_OpenInit() 36 if ((pctx = EVP_PKEY_CTX_new(priv, NULL)) == NULL) { in EVP_OpenInit()
|
/openssl/crypto/asn1/ |
H A D | p8_pkey.c | 38 int PKCS8_pkey_set0(PKCS8_PRIV_KEY_INFO *priv, ASN1_OBJECT *aobj, 43 if (!ASN1_INTEGER_set(priv->version, version)) 46 if (!X509_ALGOR_set0(priv->pkeyalg, aobj, ptype, pval)) 49 ASN1_STRING_set0(priv->pkey, penc, penclen);
|
/openssl/test/quic-openssl-docker/ |
H A D | run_endpoint.sh | 92 …EYLOGFILE=/logs/keys.log FILEPREFIX=/www quic-hq-interop-server 443 /certs/cert.pem /certs/priv.key 95 …EYLOGFILE=/logs/keys.log FILEPREFIX=/www quic-hq-interop-server 443 /certs/cert.pem /certs/priv.key 98 …EYLOGFILE=/logs/keys.log FILEPREFIX=/www quic-hq-interop-server 443 /certs/cert.pem /certs/priv.key 101 …FIX=/www/ SSLKEYLOGFILE=/logs/keys.log ossl-nghttp3-demo-server 443 /certs/cert.pem /certs/priv.key 104 …EYLOGFILE=/logs/keys.log FILEPREFIX=/www quic-hq-interop-server 443 /certs/cert.pem /certs/priv.key
|
/openssl/crypto/dh/ |
H A D | dh_backend.c | 106 const BIGNUM *priv = NULL, *pub = NULL; in ossl_dh_key_todata() local 111 DH_get0_key(dh, &pub, &priv); in ossl_dh_key_todata() 112 if (priv != NULL in ossl_dh_key_todata() 114 && !ossl_param_build_set_bn(bld, params, OSSL_PKEY_PARAM_PRIV_KEY, priv)) in ossl_dh_key_todata()
|
/openssl/apps/ |
H A D | testdsa.h | 190 unsigned char *priv; member 204 st.priv = dsa##bits##_priv; \ 242 priv_key = BN_bin2bn(dsa_t.priv, dsa_t.priv_l, NULL); in get_dsa()
|