lib/libcrypto/asn1/t_x509.c
326
if (!EVP_Digest(x->cert_info->key->public_key->data,
lib/libcrypto/asn1/t_x509.c
327
x->cert_info->key->public_key->length,
lib/libcrypto/asn1/x_pubkey.c
195
if (key->public_key == NULL)
lib/libcrypto/asn1/x_pubkey.c
755
ASN1_STRING_set0(pub->public_key, penc, penclen);
lib/libcrypto/asn1/x_pubkey.c
757
return asn1_abs_set_unused_bits(pub->public_key, 0);
lib/libcrypto/asn1/x_pubkey.c
768
*pk = pub->public_key->data;
lib/libcrypto/asn1/x_pubkey.c
769
*ppklen = pub->public_key->length;
lib/libcrypto/asn1/x_pubkey.c
99
.offset = offsetof(X509_PUBKEY, public_key),
lib/libcrypto/ct/ct.h
451
CTLOG *CTLOG_new(EVP_PKEY *public_key, const char *name);
lib/libcrypto/ct/ct_log.c
301
CTLOG_new(EVP_PKEY *public_key, const char *name)
lib/libcrypto/ct/ct_log.c
316
if (ct_v1_log_id_from_pkey(public_key, ret->log_id) != 1)
lib/libcrypto/ct/ct_log.c
319
ret->public_key = public_key;
lib/libcrypto/ct/ct_log.c
333
EVP_PKEY_free(log->public_key);
lib/libcrypto/ct/ct_log.c
357
return log->public_key;
lib/libcrypto/ct/ct_log.c
83
EVP_PKEY *public_key;
lib/libcrypto/curve25519/curve25519.c
4653
const uint8_t public_key[ED25519_PUBLIC_KEY_LENGTH],
lib/libcrypto/curve25519/curve25519.c
4676
SHA512_Update(&hash_ctx, public_key, 32);
lib/libcrypto/curve25519/curve25519.c
4701
const uint8_t public_key[ED25519_PUBLIC_KEY_LENGTH]) {
lib/libcrypto/curve25519/curve25519.c
4705
x25519_ge_frombytes_vartime(&A, public_key) != 0) {
lib/libcrypto/curve25519/curve25519.c
4713
memcpy(pkcopy, public_key, 32);
lib/libcrypto/curve25519/curve25519.c
4736
SHA512_Update(&hash_ctx, public_key, 32);
lib/libcrypto/curve25519/curve25519.h
88
const uint8_t public_key[ED25519_PUBLIC_KEY_LENGTH],
lib/libcrypto/curve25519/curve25519.h
98
const uint8_t public_key[ED25519_PUBLIC_KEY_LENGTH]);
lib/libcrypto/ec/ec_ameth.c
503
const EC_POINT *public_key;
lib/libcrypto/ec/ec_ameth.c
516
public_key = EC_KEY_get0_public_key(x);
lib/libcrypto/ec/ec_ameth.c
517
if (public_key != NULL) {
lib/libcrypto/ec/ec_ameth.c
518
if ((pub_key = EC_POINT_point2bn(group, public_key,
lib/libcrypto/ec/ec_asn1.c
1270
const EC_POINT *public_key = NULL;
lib/libcrypto/ec/ec_asn1.c
1286
if ((public_key = EC_KEY_get0_public_key(ec_key)) == NULL) {
lib/libcrypto/ec/ec_asn1.c
1309
if (public_key != NULL) {
lib/libcrypto/ec/ec_asn1.c
1313
if (!ec_point_to_asn1_bit_string(group, public_key, form,
lib/libcrypto/evp/evp.h
409
const unsigned char *public_key, size_t len);
lib/libcrypto/evp/evp_local.h
145
int (*set_pub_key)(EVP_PKEY *pk, const unsigned char *public_key,
lib/libcrypto/evp/p_lib.c
511
const unsigned char *public_key, size_t len)
lib/libcrypto/evp/p_lib.c
525
if (!pkey->ameth->set_pub_key(pkey, public_key, len)) {
lib/libcrypto/mlkem/mlkem.c
166
MLKEM_public_key *public_key)
lib/libcrypto/mlkem/mlkem.c
170
if (!public_key_is_new(public_key))
lib/libcrypto/mlkem/mlkem.c
172
if (public_key->rank != private_key->rank)
lib/libcrypto/mlkem/mlkem.c
175
mlkem_public_from_private(private_key, public_key);
lib/libcrypto/mlkem/mlkem.c
177
public_key->state = MLKEM_PUBLIC_KEY_INITIALIZED;
lib/libcrypto/mlkem/mlkem.c
184
MLKEM_encap_external_entropy(const MLKEM_public_key *public_key,
lib/libcrypto/mlkem/mlkem.c
200
if (!public_key_is_valid(public_key))
lib/libcrypto/mlkem/mlkem.c
206
ciphertext_len = MLKEM_public_key_ciphertext_length(public_key);
lib/libcrypto/mlkem/mlkem.c
211
mlkem_encap_external_entropy(ciphertext, secret, public_key, entropy);
lib/libcrypto/mlkem/mlkem.c
230
MLKEM_encap(const MLKEM_public_key *public_key,
lib/libcrypto/mlkem/mlkem.c
238
ret = MLKEM_encap_external_entropy(public_key, entropy, out_ciphertext,
lib/libcrypto/mlkem/mlkem.c
282
MLKEM_marshal_public_key(const MLKEM_public_key *public_key, uint8_t **out,
lib/libcrypto/mlkem/mlkem.c
288
if (!public_key_is_valid(public_key))
lib/libcrypto/mlkem/mlkem.c
291
return mlkem_marshal_public_key(public_key, out, out_len);
lib/libcrypto/mlkem/mlkem.c
314
MLKEM_parse_public_key(MLKEM_public_key *public_key, const uint8_t *in,
lib/libcrypto/mlkem/mlkem.c
317
if (!public_key_is_new(public_key))
lib/libcrypto/mlkem/mlkem.c
320
if (in_len != MLKEM_public_key_encoded_length(public_key))
lib/libcrypto/mlkem/mlkem.c
323
if (!mlkem_parse_public_key(in, in_len, public_key))
lib/libcrypto/mlkem/mlkem.c
326
public_key->state = MLKEM_PUBLIC_KEY_INITIALIZED;
lib/libcrypto/mlkem/mlkem.h
151
MLKEM_public_key *public_key);
lib/libcrypto/mlkem/mlkem.h
164
int MLKEM_encap(const MLKEM_public_key *public_key,
lib/libcrypto/mlkem/mlkem.h
199
int MLKEM_marshal_public_key(const MLKEM_public_key *public_key, uint8_t **out,
lib/libcrypto/mlkem/mlkem.h
209
int MLKEM_parse_public_key(MLKEM_public_key *public_key, const uint8_t *in,
lib/libcrypto/mlkem/mlkem_internal.c
1046
const MLKEM_public_key *public_key,
lib/libcrypto/mlkem/mlkem_internal.c
1049
struct public_key pub;
lib/libcrypto/mlkem/mlkem_internal.c
1053
public_key_from_external(public_key, &pub);
lib/libcrypto/mlkem/mlkem_internal.c
1059
public_key->rank);
lib/libcrypto/mlkem/mlkem_internal.c
1146
mlkem_marshal_public_key(const MLKEM_public_key *public_key,
lib/libcrypto/mlkem/mlkem_internal.c
1149
struct public_key pub;
lib/libcrypto/mlkem/mlkem_internal.c
1153
if (!CBB_init(&cbb, public_key->rank == MLKEM768_RANK ?
lib/libcrypto/mlkem/mlkem_internal.c
1156
public_key_from_external(public_key, &pub);
lib/libcrypto/mlkem/mlkem_internal.c
1157
if (!mlkem_marshal_public_key_internal(&cbb, &pub, public_key->rank))
lib/libcrypto/mlkem/mlkem_internal.c
1175
mlkem_parse_public_key_no_hash(struct public_key *pub, CBS *in, size_t rank)
lib/libcrypto/mlkem/mlkem_internal.c
1193
MLKEM_public_key *public_key)
lib/libcrypto/mlkem/mlkem_internal.c
1195
struct public_key pub;
lib/libcrypto/mlkem/mlkem_internal.c
1198
public_key_from_external(public_key, &pub);
lib/libcrypto/mlkem/mlkem_internal.c
1200
if (!mlkem_parse_public_key_no_hash(&pub, &cbs, public_key->rank))
lib/libcrypto/mlkem/mlkem_internal.c
828
struct public_key *pub)
lib/libcrypto/mlkem/mlkem_internal.c
850
struct public_key pub;
lib/libcrypto/mlkem/mlkem_internal.c
908
mlkem_marshal_public_key_internal(CBB *out, const struct public_key *pub,
lib/libcrypto/mlkem/mlkem_internal.c
999
encrypt_cpa(uint8_t *out, const struct public_key *pub,
lib/libcrypto/mlkem/mlkem_internal.h
222
int mlkem_marshal_public_key(const MLKEM_public_key *public_key,
lib/libcrypto/mlkem/mlkem_internal.h
275
const MLKEM_public_key *public_key,
lib/libcrypto/mlkem/mlkem_internal.h
283
int MLKEM_encap_external_entropy(const MLKEM_public_key *public_key,
lib/libcrypto/x509/x509_cmp.c
377
return x->cert_info->key->public_key;
lib/libcrypto/x509/x509_local.h
92
ASN1_BIT_STRING *public_key;
lib/libcrypto/x509/x509_req.c
82
EVP_PKEY *public_key;
lib/libcrypto/x509/x509_req.c
94
if ((public_key = X509_get0_pubkey(x509)) == NULL)
lib/libcrypto/x509/x509_req.c
96
if (!X509_REQ_set_pubkey(req, public_key))
lib/libcrypto/x509/x509_skey.c
148
pk = ctx->subject_req->req_info->pubkey->public_key;
lib/libcrypto/x509/x509_skey.c
150
pk = ctx->subject_cert->cert_info->key->public_key;
regress/lib/libcrypto/curve25519/ed25519test.c
372
dump_info(const uint8_t *message, size_t message_len, const uint8_t *public_key,
regress/lib/libcrypto/curve25519/ed25519test.c
380
hexdump(public_key, ED25519_PUBLIC_KEY_LENGTH);
regress/lib/libcrypto/curve25519/ed25519test.c
425
uint8_t public_key[ED25519_PUBLIC_KEY_LENGTH];
regress/lib/libcrypto/curve25519/ed25519test.c
431
ED25519_keypair(public_key, private_key);
regress/lib/libcrypto/curve25519/ed25519test.c
435
public_key, private_key)) {
regress/lib/libcrypto/curve25519/ed25519test.c
437
dump_info(message, sizeof(message), public_key, private_key,
regress/lib/libcrypto/curve25519/ed25519test.c
442
if (!ED25519_verify(message, sizeof(message), signature, public_key)) {
regress/lib/libcrypto/curve25519/ed25519test.c
444
dump_info(message, sizeof(message), public_key, private_key,
regress/lib/libcrypto/curve25519/ed25519test.c
451
if (ED25519_verify(message, sizeof(message), signature, public_key)) {
regress/lib/libcrypto/curve25519/ed25519test.c
453
dump_info(message, sizeof(message), public_key, private_key,
regress/lib/libcrypto/mlkem/mlkem_tests.c
356
CBS entropy, public_key, ciphertext, shared_secret;
regress/lib/libcrypto/mlkem/mlkem_tests.c
365
parse_get_cbs(p, ENCAP_PUBLIC_KEY, &public_key);
regress/lib/libcrypto/mlkem/mlkem_tests.c
374
CBS_data(&public_key), CBS_len(&public_key))) {
regress/lib/libcrypto/mlkem/mlkem_tests.c
494
CBS seed, public_key, private_key;
regress/lib/libcrypto/mlkem/mlkem_tests.c
502
parse_get_cbs(p, KEYGEN_PUBLIC_KEY, &public_key);
regress/lib/libcrypto/mlkem/mlkem_tests.c
518
encoded_public_key_len, CBS_len(&public_key)))
regress/lib/libcrypto/mlkem/mlkem_tests.c
532
failed |= !parse_data_equal(p, "public key", &public_key,
regress/usr.bin/ssh/misc/sk-dummy/sk-dummy.c
114
if ((response->public_key = malloc(response->public_key_len)) == NULL) {
regress/usr.bin/ssh/misc/sk-dummy/sk-dummy.c
119
response->public_key, response->public_key_len, NULL) == 0) {
regress/usr.bin/ssh/misc/sk-dummy/sk-dummy.c
142
if (response->public_key != NULL) {
regress/usr.bin/ssh/misc/sk-dummy/sk-dummy.c
143
memset(response->public_key, 0,
regress/usr.bin/ssh/misc/sk-dummy/sk-dummy.c
145
free(response->public_key);
regress/usr.bin/ssh/misc/sk-dummy/sk-dummy.c
146
response->public_key = NULL;
regress/usr.bin/ssh/misc/sk-dummy/sk-dummy.c
167
response->public_key = NULL;
regress/usr.bin/ssh/misc/sk-dummy/sk-dummy.c
177
if ((response->public_key = malloc(response->public_key_len)) == NULL) {
regress/usr.bin/ssh/misc/sk-dummy/sk-dummy.c
181
memcpy(response->public_key, pk, sizeof(pk));
regress/usr.bin/ssh/misc/sk-dummy/sk-dummy.c
193
free(response->public_key);
regress/usr.bin/ssh/misc/sk-dummy/sk-dummy.c
262
free(response->public_key);
regress/usr.bin/ssh/misc/sk-dummy/sk-dummy.c
87
response->public_key = NULL;
usr.bin/ssh/kexecdh.c
49
const EC_POINT *public_key;
usr.bin/ssh/kexecdh.c
62
public_key = EC_KEY_get0_public_key(client_key);
usr.bin/ssh/kexecdh.c
68
if ((r = sshbuf_put_ec(buf, public_key, group)) != 0 ||
usr.bin/ssh/libcrux_mlkem768_sha3.h
10162
libcrux_ml_kem_ind_cpa_unpacked_IndCpaPublicKeyUnpacked_a0 *public_key) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
10171
public_key->A;
usr.bin/ssh/libcrux_mlkem768_sha3.h
10192
public_key->t_as_ntt, public_key->A, private_key->secret_as_ntt,
usr.bin/ssh/libcrux_mlkem768_sha3.h
10199
memcpy(public_key->seed_for_A, uu____2, (size_t)32U * sizeof(uint8_t));
usr.bin/ssh/libcrux_mlkem768_sha3.h
10319
libcrux_ml_kem_ind_cpa_unpacked_IndCpaPublicKeyUnpacked_a0 *public_key,
usr.bin/ssh/libcrux_mlkem768_sha3.h
10323
public_key->t_as_ntt,
usr.bin/ssh/libcrux_mlkem768_sha3.h
10324
Eurydice_array_to_slice((size_t)32U, public_key->seed_for_A, uint8_t),
usr.bin/ssh/libcrux_mlkem768_sha3.h
10361
libcrux_ml_kem_ind_cpa_unpacked_IndCpaPublicKeyUnpacked_a0 public_key =
usr.bin/ssh/libcrux_mlkem768_sha3.h
10364
key_generation_seed, &private_key, &public_key);
usr.bin/ssh/libcrux_mlkem768_sha3.h
10365
return libcrux_ml_kem_ind_cpa_serialize_unpacked_secret_key_6c(&public_key,
usr.bin/ssh/libcrux_mlkem768_sha3.h
10381
Eurydice_slice private_key, Eurydice_slice public_key,
usr.bin/ssh/libcrux_mlkem768_sha3.h
10398
uu____3, uu____4, uu____5 + Eurydice_slice_len(public_key, uint8_t),
usr.bin/ssh/libcrux_mlkem768_sha3.h
10400
public_key, uint8_t);
usr.bin/ssh/libcrux_mlkem768_sha3.h
10401
pointer = pointer + Eurydice_slice_len(public_key, uint8_t);
usr.bin/ssh/libcrux_mlkem768_sha3.h
10406
libcrux_ml_kem_hash_functions_portable_H_4a_e0(public_key, ret);
usr.bin/ssh/libcrux_mlkem768_sha3.h
10429
Eurydice_slice private_key, Eurydice_slice public_key,
usr.bin/ssh/libcrux_mlkem768_sha3.h
10433
private_key, public_key, implicit_rejection_value, out);
usr.bin/ssh/libcrux_mlkem768_sha3.h
10470
uint8_t public_key[1184U];
usr.bin/ssh/libcrux_mlkem768_sha3.h
10471
memcpy(public_key, uu____0.snd, (size_t)1184U * sizeof(uint8_t));
usr.bin/ssh/libcrux_mlkem768_sha3.h
10475
Eurydice_array_to_slice((size_t)1184U, public_key, uint8_t),
usr.bin/ssh/libcrux_mlkem768_sha3.h
10486
memcpy(copy_of_public_key, public_key, (size_t)1184U * sizeof(uint8_t));
usr.bin/ssh/libcrux_mlkem768_sha3.h
10659
Eurydice_slice public_key,
usr.bin/ssh/libcrux_mlkem768_sha3.h
10670
public_key, deserialized_pk);
usr.bin/ssh/libcrux_mlkem768_sha3.h
10691
uint8_t *public_key) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
10695
(size_t)1184U, public_key,
usr.bin/ssh/libcrux_mlkem768_sha3.h
10704
(size_t)1184U, public_key,
usr.bin/ssh/libcrux_mlkem768_sha3.h
10708
return Eurydice_array_eq((size_t)1184U, public_key, public_key_serialized,
usr.bin/ssh/libcrux_mlkem768_sha3.h
10724
uint8_t *public_key) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
10725
return libcrux_ml_kem_ind_cca_validate_public_key_89(public_key);
usr.bin/ssh/libcrux_mlkem768_sha3.h
10734
libcrux_ml_kem_types_MlKemPublicKey_30 *public_key) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
10736
public_key->value);
usr.bin/ssh/libcrux_mlkem768_sha3.h
10768
libcrux_ml_kem_ind_cca_unpacked_MlKemPublicKeyUnpacked_a0 public_key;
usr.bin/ssh/libcrux_mlkem768_sha3.h
10807
Eurydice_array_to_slice((size_t)32U, key_pair->public_key.public_key_hash,
usr.bin/ssh/libcrux_mlkem768_sha3.h
10835
&key_pair->public_key.ind_cpa_public_key, decrypted, pseudorandomness,
usr.bin/ssh/libcrux_mlkem768_sha3.h
10937
libcrux_ml_kem_ind_cca_unpacked_MlKemPublicKeyUnpacked_a0 *public_key,
usr.bin/ssh/libcrux_mlkem768_sha3.h
10942
Eurydice_array_to_slice((size_t)32U, public_key->public_key_hash,
usr.bin/ssh/libcrux_mlkem768_sha3.h
10952
libcrux_ml_kem_ind_cpa_encrypt_unpacked_2a(&public_key->ind_cpa_public_key,
usr.bin/ssh/libcrux_mlkem768_sha3.h
10997
libcrux_ml_kem_ind_cca_unpacked_MlKemPublicKeyUnpacked_a0 *public_key,
usr.bin/ssh/libcrux_mlkem768_sha3.h
10999
return libcrux_ml_kem_ind_cca_unpacked_encapsulate_0c(public_key, randomness);
usr.bin/ssh/libcrux_mlkem768_sha3.h
11011
libcrux_ml_kem_ind_cca_unpacked_MlKemPublicKeyUnpacked_a0 *public_key,
usr.bin/ssh/libcrux_mlkem768_sha3.h
11014
public_key, randomness);
usr.bin/ssh/libcrux_mlkem768_sha3.h
11146
&out->public_key.ind_cpa_public_key);
usr.bin/ssh/libcrux_mlkem768_sha3.h
11148
memcpy(uu____0, out->public_key.ind_cpa_public_key.A,
usr.bin/ssh/libcrux_mlkem768_sha3.h
11157
memcpy(out->public_key.ind_cpa_public_key.A, uu____1,
usr.bin/ssh/libcrux_mlkem768_sha3.h
11162
out->public_key.ind_cpa_public_key.t_as_ntt,
usr.bin/ssh/libcrux_mlkem768_sha3.h
11164
(size_t)32U, out->public_key.ind_cpa_public_key.seed_for_A, uint8_t),
usr.bin/ssh/libcrux_mlkem768_sha3.h
11169
memcpy(out->public_key.public_key_hash, uu____2,
usr.bin/ssh/libcrux_mlkem768_sha3.h
11258
.public_key = libcrux_ml_kem_ind_cca_unpacked_default_30_1b()});
usr.bin/ssh/libcrux_mlkem768_sha3.h
11321
ind_cpa_public_key, &key_pair->public_key.ind_cpa_public_key);
usr.bin/ssh/libcrux_mlkem768_sha3.h
11323
Eurydice_array_to_slice((size_t)32U, key_pair->public_key.public_key_hash,
usr.bin/ssh/libcrux_mlkem768_sha3.h
11332
(size_t)32U, key_pair->public_key.ind_cpa_public_key.seed_for_A,
usr.bin/ssh/libcrux_mlkem768_sha3.h
11393
&self->public_key.ind_cpa_public_key,
usr.bin/ssh/libcrux_mlkem768_sha3.h
11490
return libcrux_ml_kem_ind_cca_unpacked_serialized_dd_89(&self->public_key);
usr.bin/ssh/libcrux_mlkem768_sha3.h
11542
libcrux_ml_kem_ind_cca_unpacked_serialized_mut_dd_89(&self->public_key,
usr.bin/ssh/libcrux_mlkem768_sha3.h
11631
return &self->public_key;
usr.bin/ssh/libcrux_mlkem768_sha3.h
11651
libcrux_ml_kem_ind_cca_unpacked_MlKemPublicKeyUnpacked_a0 *public_key,
usr.bin/ssh/libcrux_mlkem768_sha3.h
11653
libcrux_ml_kem_ind_cca_unpacked_serialized_mut_dd_89(public_key, serialized);
usr.bin/ssh/libcrux_mlkem768_sha3.h
11669
libcrux_ml_kem_types_MlKemPublicKey_30 *public_key,
usr.bin/ssh/libcrux_mlkem768_sha3.h
11673
Eurydice_array_to_subslice_to((size_t)1184U, public_key->value,
usr.bin/ssh/libcrux_mlkem768_sha3.h
11679
Eurydice_array_to_subslice_from((size_t)1184U, public_key->value,
usr.bin/ssh/libcrux_mlkem768_sha3.h
11689
Eurydice_array_to_subslice_from((size_t)1184U, public_key->value,
usr.bin/ssh/libcrux_mlkem768_sha3.h
11697
libcrux_ml_kem_types_as_slice_e6_d0(public_key),
usr.bin/ssh/libcrux_mlkem768_sha3.h
11717
libcrux_ml_kem_types_MlKemPublicKey_30 *public_key,
usr.bin/ssh/libcrux_mlkem768_sha3.h
11720
libcrux_ml_kem_ind_cca_unpacked_unpack_public_key_0a(public_key,
usr.bin/ssh/libcrux_mlkem768_sha3.h
11729
libcrux_ml_kem_types_MlKemPublicKey_30 *public_key,
usr.bin/ssh/libcrux_mlkem768_sha3.h
11733
public_key, unpacked_public_key);
usr.bin/ssh/libcrux_mlkem768_sha3.h
8177
Eurydice_slice public_key,
usr.bin/ssh/libcrux_mlkem768_sha3.h
8180
i < Eurydice_slice_len(public_key, uint8_t) /
usr.bin/ssh/libcrux_mlkem768_sha3.h
8185
public_key, i0 * LIBCRUX_ML_KEM_CONSTANTS_BYTES_PER_RING_ELEMENT,
usr.bin/ssh/libcrux_mlkem768_sha3.h
8650
Eurydice_slice public_key,
usr.bin/ssh/libcrux_mlkem768_sha3.h
8654
public_key, (size_t)1152U, uint8_t, size_t, uint8_t[]);
usr.bin/ssh/libcrux_mlkem768_sha3.h
8658
public_key, (size_t)1152U, uint8_t, size_t, uint8_t[]);
usr.bin/ssh/libcrux_mlkem768_sha3.h
8677
Eurydice_slice public_key) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
8680
libcrux_ml_kem_ind_cpa_build_unpacked_public_key_mut_3f(public_key,
usr.bin/ssh/libcrux_mlkem768_sha3.h
9590
libcrux_ml_kem_ind_cpa_unpacked_IndCpaPublicKeyUnpacked_a0 *public_key,
usr.bin/ssh/libcrux_mlkem768_sha3.h
9594
randomness, public_key->A,
usr.bin/ssh/libcrux_mlkem768_sha3.h
9603
public_key->t_as_ntt;
usr.bin/ssh/libcrux_mlkem768_sha3.h
9633
Eurydice_slice public_key, uint8_t *message, Eurydice_slice randomness,
usr.bin/ssh/libcrux_mlkem768_sha3.h
9637
libcrux_ml_kem_ind_cpa_build_unpacked_public_key_3f(public_key);
usr.bin/ssh/libcrux_mlkem768_sha3.h
9849
libcrux_ml_kem_types_MlKemPublicKey_30 *public_key, uint8_t *randomness) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
9862
libcrux_ml_kem_types_as_slice_e6_d0(public_key),
usr.bin/ssh/libcrux_mlkem768_sha3.h
9879
libcrux_ml_kem_types_as_slice_e6_d0(public_key),
usr.bin/ssh/libcrux_mlkem768_sha3.h
9912
libcrux_ml_kem_types_MlKemPublicKey_30 *public_key, uint8_t *randomness) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
9913
return libcrux_ml_kem_ind_cca_encapsulate_ca(public_key, randomness);
usr.bin/ssh/libcrux_mlkem768_sha3.h
9924
libcrux_ml_kem_types_MlKemPublicKey_30 *public_key,
usr.bin/ssh/libcrux_mlkem768_sha3.h
9927
public_key, randomness);
usr.bin/ssh/pkcs11.h
1238
ck_object_handle_t *public_key,
usr.bin/ssh/sk-api.h
43
uint8_t *public_key;
usr.bin/ssh/sk-usbhid.c
1275
freezero(srk->key.public_key, srk->key.public_key_len);
usr.bin/ssh/sk-usbhid.c
1329
freezero(rks[i]->key.public_key, rks[i]->key.public_key_len);
usr.bin/ssh/sk-usbhid.c
486
response->public_key = NULL;
usr.bin/ssh/sk-usbhid.c
522
if ((response->public_key = malloc(response->public_key_len)) == NULL) {
usr.bin/ssh/sk-usbhid.c
527
response->public_key, response->public_key_len, NULL) == 0) {
usr.bin/ssh/sk-usbhid.c
534
if (ret != 0 && response->public_key != NULL) {
usr.bin/ssh/sk-usbhid.c
535
memset(response->public_key, 0, response->public_key_len);
usr.bin/ssh/sk-usbhid.c
536
free(response->public_key);
usr.bin/ssh/sk-usbhid.c
537
response->public_key = NULL;
usr.bin/ssh/sk-usbhid.c
555
response->public_key = NULL;
usr.bin/ssh/sk-usbhid.c
567
if ((response->public_key = malloc(response->public_key_len)) == NULL) {
usr.bin/ssh/sk-usbhid.c
571
memcpy(response->public_key, ptr, len);
usr.bin/ssh/sk-usbhid.c
575
free(response->public_key);
usr.bin/ssh/sk-usbhid.c
892
free(response->public_key);
usr.bin/ssh/ssh-sk.c
168
freezero(r->public_key, r->public_key_len);
usr.bin/ssh/ssh-sk.c
213
resp->public_key, resp->public_key_len)) != 0) {
usr.bin/ssh/ssh-sk.c
278
memcpy(key->ed25519_pk, resp->public_key, ED25519_PK_SZ);
usr.bin/ssh/ssh-sk.c
298
if (resp->public_key == NULL || resp->key_handle == NULL) {
usr.bin/ssh/ssh-sk.c
748
freezero(rks[i]->key.public_key, rks[i]->key.public_key_len);