Home
last modified time | relevance | path

Searched refs:private_key (Results 1 – 25 of 139) sorted by relevance

123456

/third_party/node/deps/openssl/openssl/include/crypto/
Decx.h87 int ossl_x25519(uint8_t out_shared_key[32], const uint8_t private_key[32],
90 const uint8_t private_key[32]);
94 const uint8_t private_key[32],
98 const uint8_t public_key[32], const uint8_t private_key[32],
107 const uint8_t private_key[57], const char *propq);
111 const uint8_t private_key[57], const uint8_t *context,
120 ossl_x448(uint8_t out_shared_key[56], const uint8_t private_key[56],
124 const uint8_t private_key[56]);
/third_party/openssl/include/crypto/
Decx.h87 int ossl_x25519(uint8_t out_shared_key[32], const uint8_t private_key[32],
90 const uint8_t private_key[32]);
94 const uint8_t private_key[32],
98 const uint8_t public_key[32], const uint8_t private_key[32],
107 const uint8_t private_key[57], const char *propq);
111 const uint8_t private_key[57], const uint8_t *context,
120 ossl_x448(uint8_t out_shared_key[56], const uint8_t private_key[56],
124 const uint8_t private_key[56]);
/third_party/rust/crates/rust-openssl/openssl/src/
Decdsa.rs164 let private_key = EcKey::generate(&group).unwrap(); in sign_and_verify() localVariable
165 let public_key = get_public_key(&group, &private_key).unwrap(); in sign_and_verify()
171 let res = EcdsaSig::sign(data.as_bytes(), &private_key).unwrap(); in sign_and_verify()
192 let private_key = EcKey::generate(&group).unwrap(); in check_private_components() localVariable
193 let public_key = get_public_key(&group, &private_key).unwrap(); in check_private_components()
195 let res = EcdsaSig::sign(data.as_bytes(), &private_key).unwrap(); in check_private_components()
212 let private_key = EcKey::generate(&group).unwrap(); in serialize_deserialize() localVariable
213 let public_key = get_public_key(&group, &private_key).unwrap(); in serialize_deserialize()
216 let res = EcdsaSig::sign(data.as_bytes(), &private_key).unwrap(); in serialize_deserialize()
Ddh.rs262 pub fn private_key(&self) -> &BigNumRef { in private_key() function
393 .set_private_key(key1.private_key().to_owned().unwrap()) in test_dh_stored_restored()
397 assert_eq!(key1.private_key(), key2.private_key()); in test_dh_stored_restored()
417 key1.private_key().to_owned().unwrap(), in test_set_keys()
421 assert_eq!(key1.private_key(), key3.private_key()); in test_set_keys()
Dencrypt.rs494 let private_key = Rsa::private_key_from_pem(key).unwrap(); in rsa_encrypt_decrypt() localVariable
495 let pkey = PKey::from_rsa(private_key).unwrap(); in rsa_encrypt_decrypt()
519 let private_key = Rsa::private_key_from_pem(key).unwrap(); in rsa_encrypt_decrypt_with_sha256() localVariable
520 let pkey = PKey::from_rsa(private_key).unwrap(); in rsa_encrypt_decrypt_with_sha256()
550 let private_key = Rsa::private_key_from_pem(key).unwrap(); in rsa_encrypt_decrypt_oaep_label() localVariable
551 let pkey = PKey::from_rsa(private_key).unwrap(); in rsa_encrypt_decrypt_oaep_label()
Dsign.rs676 let private_key = Rsa::private_key_from_pem(key).unwrap(); in rsa_sign() localVariable
677 let pkey = PKey::from_rsa(private_key).unwrap(); in rsa_sign()
691 let private_key = Rsa::private_key_from_pem(key).unwrap(); in rsa_verify_ok() localVariable
692 let pkey = PKey::from_rsa(private_key).unwrap(); in rsa_verify_ok()
703 let private_key = Rsa::private_key_from_pem(key).unwrap(); in rsa_verify_invalid() localVariable
704 let pkey = PKey::from_rsa(private_key).unwrap(); in rsa_verify_invalid()
864 let private_key = Rsa::private_key_from_pem(key).unwrap(); in rsa_sign_verify() localVariable
865 let pkey = PKey::from_rsa(private_key).unwrap(); in rsa_sign_verify()
/third_party/mbedtls/tests/suites/
Dtest_suite_lmots.data32 # private_key = pickle.load(private_key_file)
34 # ots_private_key = LM_OTS_Priv(private_key.otstypecode, private_key.I, 0, private_key.SEED)
57 # private_key = pickle.load(private_key_file)
59 #ots_private_key = LM_OTS_Priv(private_key.otstypecode, private_key.I, 1, private_key.SEED)
80 # private_key = pickle.load(private_key_file)
82 #ots_private_key = LM_OTS_Priv(private_key.otstypecode, private_key.I, 3, private_key.SEED)
Dtest_suite_lms.data29 # private_key = pyhsslms.HssLmsPrivateKey('tmp/lms')
30 # public_key = private_key.hss_pub
33 # sig1 = private_key.sign(message1)[4:]
47 # sig2 = private_key.sign(message2)[4:]
153 # private_key = pickle.load(private_key_file)
155 # public_key = private_key.gen_pub()
158 # sig = private_key.sign(message)
176 # private_key = pickle.load(private_key_file)
178 # public_key = private_key.gen_pub()
181 # sig = private_key.sign(message)
[all …]
/third_party/libcoap/src/
Dcoap_mbedtls.c127 mbedtls_pk_context private_key; member
143 mbedtls_pk_context private_key; member
499 mbedtls_pk_context *private_key, in setup_pki_credentials() argument
515 setup_data->pki_key.key.pem.private_key && in setup_pki_credentials()
516 setup_data->pki_key.key.pem.private_key[0]) { in setup_pki_credentials()
519 mbedtls_pk_init(private_key); in setup_pki_credentials()
530 ret = mbedtls_pk_parse_keyfile(private_key, in setup_pki_credentials()
531 setup_data->pki_key.key.pem.private_key, NULL); in setup_pki_credentials()
533 ret = mbedtls_pk_parse_keyfile(private_key, in setup_pki_credentials()
534 setup_data->pki_key.key.pem.private_key, in setup_pki_credentials()
[all …]
Dcoap_openssl.c1143 if (setup_data->pki_key.key.pem.private_key && in setup_pki_server()
1144 setup_data->pki_key.key.pem.private_key[0]) { in setup_pki_server()
1146 setup_data->pki_key.key.pem.private_key, in setup_pki_server()
1150 setup_data->pki_key.key.pem.private_key); in setup_pki_server()
1221 if (setup_data->pki_key.key.pem_buf.private_key && in setup_pki_server()
1223 BIO *bp = BIO_new_mem_buf(setup_data->pki_key.key.pem_buf.private_key, in setup_pki_server()
1282 if (setup_data->pki_key.key.asn1.private_key && in setup_pki_server()
1286 setup_data->pki_key.key.asn1.private_key, in setup_pki_server()
1344 if (setup_data->pki_key.key.pkcs11.private_key && in setup_pki_server()
1345 setup_data->pki_key.key.pkcs11.private_key[0]) { in setup_pki_server()
[all …]
Dcoap_tinydtls.c1234 setup_data->pki_key.key.pem_buf.private_key && in coap_dtls_context_set_pki()
1235 setup_data->pki_key.key.pem_buf.private_key[0]) { in coap_dtls_context_set_pki()
1238 setup_data->pki_key.key.pem_buf.private_key); in coap_dtls_context_set_pki()
1241 setup_data->pki_key.key.pem_buf.private_key); in coap_dtls_context_set_pki()
1261 setup_data->pki_key.key.pem_buf.private_key); in coap_dtls_context_set_pki()
1264 setup_data->pki_key.key.pem_buf.private_key); in coap_dtls_context_set_pki()
1295 if (setup_data->pki_key.key.asn1.private_key && in coap_dtls_context_set_pki()
1298 const uint8_t *private_key = setup_data->pki_key.key.asn1.private_key; in coap_dtls_context_set_pki() local
1303 setup_data->pki_key.key.asn1.private_key, in coap_dtls_context_set_pki()
1306 private_key = asn1_temp->s; in coap_dtls_context_set_pki()
[all …]
/third_party/libcoap/include/coap3/
Dcoap_dtls.h201 const char *private_key; /**< File location of Private Key in PEM format */ member
216 const uint8_t *private_key; /**< PEM buffer Private Key member
230 const uint8_t *private_key; /**< ASN1 (DER) Private Key */ member
243 const char *private_key; /**< pkcs11: URI for Private Key */ member
/third_party/libwebsockets/lib/tls/
Dtls-network.c127 const char *private_key) in lws_tls_generic_cert_checks() argument
142 if (!cert || !private_key) in lws_tls_generic_cert_checks()
148 m = (int)lws_tls_use_any_upgrade_check_extant(private_key); in lws_tls_generic_cert_checks()
154 lwsl_vhost_notice(vhost, "Ignoring missing %s or %s", cert, private_key); in lws_tls_generic_cert_checks()
/third_party/libwebsockets/lib/tls/openssl/
Dopenssl-server.c154 const char *cert, const char *private_key, argument
177 int n = (int)lws_tls_generic_cert_checks(vhost, cert, private_key), m;
179 if (!cert && !private_key)
202 private_key = NULL;
231 if (!private_key) {
236 if (SSL_CTX_use_PrivateKey_file(vhost->tls.ssl_ctx, private_key,
247 private_key, error, s);
284 if (lws_tls_alloc_pem_to_der_file(vhost->context, private_key,
387 if (n == LWS_TLS_EXTANT_ALTERNATIVE || !private_key) {
392 if (SSL_CTX_use_PrivateKey_file(vhost->tls.ssl_ctx, private_key,
[all …]
/third_party/openssl/crypto/ec/curve448/
Deddsa.c378 const uint8_t private_key[57], const uint8_t *context, in ossl_ed448_sign()
381 return ossl_c448_ed448_sign(ctx, out_sig, private_key, public_key, message, in ossl_ed448_sign()
398 const uint8_t public_key[57], const uint8_t private_key[57], in ossl_ed448ph_sign()
401 return ossl_c448_ed448_sign_prehash(ctx, out_sig, private_key, public_key, in ossl_ed448ph_sign()
419 const uint8_t private_key[57], const char *propq) in ossl_ed448_public_from_private()
421 return ossl_c448_ed448_derive_public_key(ctx, out_public_key, private_key, in ossl_ed448_public_from_private()
/third_party/node/deps/openssl/openssl/crypto/ec/curve448/
Deddsa.c378 const uint8_t private_key[57], const uint8_t *context, in ossl_ed448_sign()
381 return ossl_c448_ed448_sign(ctx, out_sig, private_key, public_key, message, in ossl_ed448_sign()
398 const uint8_t public_key[57], const uint8_t private_key[57], in ossl_ed448ph_sign()
401 return ossl_c448_ed448_sign_prehash(ctx, out_sig, private_key, public_key, in ossl_ed448ph_sign()
419 const uint8_t private_key[57], const char *propq) in ossl_ed448_public_from_private()
421 return ossl_c448_ed448_derive_public_key(ctx, out_public_key, private_key, in ossl_ed448_public_from_private()
/third_party/node/src/crypto/
Dcrypto_ec.cc373 bool ECDH::IsKeyValidForCurve(const BignumPointer& private_key) { in IsKeyValidForCurve() argument
375 CHECK(private_key); in IsKeyValidForCurve()
378 if (BN_cmp(private_key.get(), BN_value_one()) < 0) { in IsKeyValidForCurve()
384 BN_cmp(private_key.get(), order.get()) < 0; in IsKeyValidForCurve()
464 KeyObjectHandle* private_key; in AdditionalConfig() local
470 ASSIGN_OR_RETURN_UNWRAP(&private_key, args[offset + 2], Nothing<bool>()); in AdditionalConfig()
472 if (private_key->Data()->GetKeyType() != kKeyTypePrivate || in AdditionalConfig()
479 params->private_ = private_key->Data(); in AdditionalConfig()
520 const EC_KEY* private_key; in DeriveBits() local
523 private_key = EVP_PKEY_get0_EC_KEY(m_privkey.get()); in DeriveBits()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/
Dwpa_supplicant.conf1577 private_key="/etc/cert/user.prv"
1691 private_key="/etc/cert/user.prv"
1826 private_key="/etc/cert/user.prv"
1844 private_key="pkcs11:manufacturer=piv_II;id=%01"
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/
Dwpa_supplicant.conf1735 private_key="/etc/cert/user.prv"
1849 private_key="/etc/cert/user.prv"
1984 private_key="/etc/cert/user.prv"
2002 private_key="pkcs11:manufacturer=piv_II;id=%01"
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
Dtls_openssl.c245 EVP_PKEY *private_key; /* the private key if using engine */ member
1197 conn->private_key = EVP_PKEY_from_keystore(key_id); in tls_engine_init()
1198 if (!conn->private_key) { in tls_engine_init()
1250 conn->private_key = ENGINE_load_private_key(conn->engine, in tls_engine_init()
1253 if (!conn->private_key) { in tls_engine_init()
1290 if (conn->private_key) { in tls_engine_init()
1291 EVP_PKEY_free(conn->private_key); in tls_engine_init()
1292 conn->private_key = NULL; in tls_engine_init()
1306 if (conn->private_key) { in tls_engine_deinit()
1307 EVP_PKEY_free(conn->private_key); in tls_engine_deinit()
[all …]
Dtls_gnutls.c546 if (params->client_cert && params->private_key) { in tls_connection_set_params()
549 params->client_cert, params->private_key); in tls_connection_set_params()
552 conn->xcred, params->client_cert, params->private_key, in tls_connection_set_params()
557 conn->xcred, params->client_cert, params->private_key, in tls_connection_set_params()
567 params->private_key, GNUTLS_X509_FMT_PEM, in tls_connection_set_params()
572 params->private_key, GNUTLS_X509_FMT_PEM); in tls_connection_set_params()
586 } else if (params->private_key) { in tls_connection_set_params()
592 params->private_key); in tls_connection_set_params()
594 conn->xcred, params->private_key, GNUTLS_X509_FMT_DER, in tls_connection_set_params()
793 if (params->client_cert && params->private_key) { in tls_global_set_params()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
Dtls_gnutls.c546 if (params->client_cert && params->private_key) { in tls_connection_set_params()
549 params->client_cert, params->private_key); in tls_connection_set_params()
552 conn->xcred, params->client_cert, params->private_key, in tls_connection_set_params()
557 conn->xcred, params->client_cert, params->private_key, in tls_connection_set_params()
567 params->private_key, GNUTLS_X509_FMT_PEM, in tls_connection_set_params()
572 params->private_key, GNUTLS_X509_FMT_PEM); in tls_connection_set_params()
586 } else if (params->private_key) { in tls_connection_set_params()
592 params->private_key); in tls_connection_set_params()
594 conn->xcred, params->private_key, GNUTLS_X509_FMT_DER, in tls_connection_set_params()
793 if (params->client_cert && params->private_key) { in tls_global_set_params()
[all …]
Dtls_openssl.c240 EVP_PKEY *private_key; /* the private key if using engine */ member
1185 conn->private_key = EVP_PKEY_from_keystore(key_id); in tls_engine_init()
1186 if (!conn->private_key) { in tls_engine_init()
1238 conn->private_key = ENGINE_load_private_key(conn->engine, in tls_engine_init()
1241 if (!conn->private_key) { in tls_engine_init()
1278 if (conn->private_key) { in tls_engine_init()
1279 EVP_PKEY_free(conn->private_key); in tls_engine_init()
1280 conn->private_key = NULL; in tls_engine_init()
1294 if (conn->private_key) { in tls_engine_deinit()
1295 EVP_PKEY_free(conn->private_key); in tls_engine_deinit()
[all …]
/third_party/node/deps/openssl/openssl/crypto/asn1/
Dn_pkey.c28 ASN1_OCTET_STRING *private_key; member
53 ASN1_SIMPLE(NETSCAPE_PKEY, private_key, ASN1_OCTET_STRING)
/third_party/openssl/crypto/asn1/
Dn_pkey.c28 ASN1_OCTET_STRING *private_key; member
53 ASN1_SIMPLE(NETSCAPE_PKEY, private_key, ASN1_OCTET_STRING)

123456