public_key
struct public_key *pub;
ctx.pub = kzalloc_obj(struct public_key);
struct public_key *pub;
struct public_key *pub;
static struct public_key *pkcs8_parse(const void *data, size_t datalen)
struct public_key *pkey = params->key->payload.data[asym_crypto];
const struct public_key *pkey = params->key->payload.data[asym_crypto];
struct public_key *key = asymmetric_key->payload.data[asym_crypto];
int public_key_verify_signature(const struct public_key *pkey,
void public_key_free(struct public_key *key)
const struct public_key *pk = key->payload.data[asym_crypto];
software_key_determine_akcipher(const struct public_key *pkey,
const struct public_key *pkey;
const struct public_key *pkey;
cert->pub = kzalloc_obj(struct public_key);
struct public_key *pub; /* Public key details */
const u64 *private_key, u64 *public_key)
ecc_swap_digits(pk->x, public_key, ndigits);
ecc_swap_digits(pk->y, &public_key[ndigits], ndigits);
const u64 *private_key, const u64 *public_key,
if (!private_key || !public_key || ndigits > ARRAY_SIZE(rand_z)) {
ecc_swap_digits(public_key, pk->x, ndigits);
ecc_swap_digits(&public_key[ndigits], pk->y, ndigits);
buf = public_key;
kfree(public_key);
u64 *public_key;
public_key = kmalloc(public_key_sz, GFP_KERNEL);
if (!public_key)
public_key, public_key_sz);
ctx->private_key, public_key,
ctx->private_key, public_key);
public_key = kmalloc(ATMEL_ECC_PUBKEY_SIZE, GFP_KERNEL);
if (!public_key)
memcpy(public_key, &cmd->data[RSP_DATA_IDX], ATMEL_ECC_PUBKEY_SIZE);
ctx->public_key = public_key;
kfree(public_key);
if (!ctx->public_key)
ctx->public_key, nbytes);
kfree(ctx->public_key);
const u8 *public_key;
void *public_key;
kfree(ctx->public_key);
ctx->public_key = NULL;
u8 *public_key = NULL, *preshared_key = NULL;
public_key = nla_data(attrs[WGPEER_A_PUBLIC_KEY]);
peer = wg_peer_create(wg, public_key, preshared_key);
u8 public_key[NOISE_PUBLIC_KEY_LEN];
if (curve25519_generate_public(public_key, private_key)) {
public_key);
const u8 public_key[NOISE_PUBLIC_KEY_LEN],
public_key, preshared_key, peer);
const u8 public_key[NOISE_PUBLIC_KEY_LEN],
__le32 public_key[];
__le32 public_key[];
__le32 public_key[MPI3_PUBLIC_KEY_MAX];
uint32_t public_key[0x41];
const u64 *private_key, u64 *public_key);
const u64 *private_key, const u64 *public_key,
int public_key_verify_signature(const struct public_key *pkey,
int public_key_verify_signature(const struct public_key *pkey,
extern void public_key_free(struct public_key *key);
const struct public_key *asymmetric_key_public_key(const struct key *key)
int generate_ecdh_public_key(struct crypto_kpp *tfm, u8 public_key[64])
swap_digits((u64 *)tmp, (u64 *)public_key, 4); /* x */
swap_digits((u64 *)&tmp[32], (u64 *)&public_key[32], 4); /* y */
int generate_ecdh_keys(struct crypto_kpp *tfm, u8 public_key[64])
return generate_ecdh_public_key(tfm, public_key);
int compute_ecdh_secret(struct crypto_kpp *tfm, const u8 public_key[64],
swap_digits((u64 *)public_key, (u64 *)tmp, 4); /* x */
swap_digits((u64 *)&public_key[32], (u64 *)&tmp[32], 4); /* y */
int generate_ecdh_public_key(struct crypto_kpp *tfm, u8 public_key[64]);
int generate_ecdh_keys(struct crypto_kpp *tfm, u8 public_key[64]);
const struct public_key *pk;