/third_party/node/deps/openssl/openssl/include/crypto/ |
H A D | ecx.h | 87 int ossl_x25519(uint8_t out_shared_key[32], const uint8_t private_key[32], 90 const uint8_t private_key[32]); 94 const uint8_t private_key[32], 98 const uint8_t public_key[32], const uint8_t private_key[32], 107 const uint8_t private_key[57], const char *propq); 111 const uint8_t private_key[57], const uint8_t *context, 120 ossl_x448(uint8_t out_shared_key[56], const uint8_t private_key[56], 124 const uint8_t private_key[56]);
|
/third_party/openssl/include/crypto/ |
H A D | ecx.h | 87 int ossl_x25519(uint8_t out_shared_key[32], const uint8_t private_key[32], 90 const uint8_t private_key[32]); 94 const uint8_t private_key[32], 98 const uint8_t public_key[32], const uint8_t private_key[32], 107 const uint8_t private_key[57], const char *propq); 111 const uint8_t private_key[57], const uint8_t *context, 120 ossl_x448(uint8_t out_shared_key[56], const uint8_t private_key[56], 124 const uint8_t private_key[56]);
|
/third_party/rust/crates/rust-openssl/openssl/src/ |
H A D | ecdsa.rs | 164 let private_key = EcKey::generate(&group).unwrap(); in sign_and_verify() 165 let public_key = get_public_key(&group, &private_key).unwrap(); in sign_and_verify() 171 let res = EcdsaSig::sign(data.as_bytes(), &private_key).unwrap(); in sign_and_verify() 192 let private_key = EcKey::generate(&group).unwrap(); in check_private_components() 193 let public_key = get_public_key(&group, &private_key).unwrap(); in check_private_components() 195 let res = EcdsaSig::sign(data.as_bytes(), &private_key).unwrap(); in check_private_components() 212 let private_key = EcKey::generate(&group).unwrap(); in serialize_deserialize() 213 let public_key = get_public_key(&group, &private_key).unwrap(); in serialize_deserialize() 216 let res = EcdsaSig::sign(data.as_bytes(), &private_key).unwrap(); in serialize_deserialize()
|
H A D | dh.rs | 262 pub fn private_key(&self) -> &BigNumRef { in private_key() functions 393 .set_private_key(key1.private_key().to_owned().unwrap()) in test_dh_stored_restored() 397 assert_eq!(key1.private_key(), key2.private_key()); in test_dh_stored_restored() 417 key1.private_key().to_owned().unwrap(), in test_set_keys() 421 assert_eq!(key1.private_key(), key3.private_key()); in test_set_keys()
|
H A D | sign.rs | 676 let private_key = Rsa::private_key_from_pem(key).unwrap(); in rsa_sign() 677 let pkey = PKey::from_rsa(private_key).unwrap(); in rsa_sign() 691 let private_key = Rsa::private_key_from_pem(key).unwrap(); in rsa_verify_ok() 692 let pkey = PKey::from_rsa(private_key).unwrap(); in rsa_verify_ok() 703 let private_key = Rsa::private_key_from_pem(key).unwrap(); in rsa_verify_invalid() 704 let pkey = PKey::from_rsa(private_key).unwrap(); in rsa_verify_invalid() 864 let private_key = Rsa::private_key_from_pem(key).unwrap(); in rsa_sign_verify() 865 let pkey = PKey::from_rsa(private_key).unwrap(); in rsa_sign_verify()
|
H A D | encrypt.rs | 200 /// # let private_key = Rsa::private_key_from_pem(key).unwrap(); 201 /// # let pkey = PKey::from_rsa(private_key).unwrap(); 419 /// # let private_key = Rsa::private_key_from_pem(key).unwrap(); 420 /// # let pkey = PKey::from_rsa(private_key).unwrap(); 494 let private_key = Rsa::private_key_from_pem(key).unwrap(); in rsa_encrypt_decrypt() 495 let pkey = PKey::from_rsa(private_key).unwrap(); in rsa_encrypt_decrypt() 519 let private_key = Rsa::private_key_from_pem(key).unwrap(); in rsa_encrypt_decrypt_with_sha256() 520 let pkey = PKey::from_rsa(private_key).unwrap(); in rsa_encrypt_decrypt_with_sha256() 550 let private_key = Rsa::private_key_from_pem(key).unwrap(); in rsa_encrypt_decrypt_oaep_label() 551 let pkey = PKey::from_rsa(private_key) in rsa_encrypt_decrypt_oaep_label() [all...] |
/third_party/libcoap/include/coap3/ |
H A D | coap_dtls.h | 201 const char *private_key; /**< File location of Private Key in PEM format */ member 216 const uint8_t *private_key; /**< PEM buffer Private Key member 218 for both the public_cert and private_key */ 230 const uint8_t *private_key; /**< ASN1 (DER) Private Key */ member 243 const char *private_key; /**< pkcs11: URI for Private Key */ member
|
/third_party/libcoap/src/ |
H A D | coap_mbedtls.c | 127 mbedtls_pk_context private_key; member 143 mbedtls_pk_context private_key; member 499 mbedtls_pk_context *private_key, in setup_pki_credentials() 515 setup_data->pki_key.key.pem.private_key && in setup_pki_credentials() 516 setup_data->pki_key.key.pem.private_key[0]) { in setup_pki_credentials() 519 mbedtls_pk_init(private_key); in setup_pki_credentials() 530 ret = mbedtls_pk_parse_keyfile(private_key, in setup_pki_credentials() 531 setup_data->pki_key.key.pem.private_key, NULL); in setup_pki_credentials() 533 ret = mbedtls_pk_parse_keyfile(private_key, in setup_pki_credentials() 534 setup_data->pki_key.key.pem.private_key, in setup_pki_credentials() 497 setup_pki_credentials(mbedtls_x509_crt *cacert, mbedtls_x509_crt *public_cert, mbedtls_pk_context *private_key, coap_mbedtls_env_t *m_env, coap_mbedtls_context_t *m_context, coap_session_t *c_session, coap_dtls_pki_t *setup_data, coap_dtls_role_t role) setup_pki_credentials() argument [all...] |
H A D | coap_tinydtls.c | 1234 setup_data->pki_key.key.pem_buf.private_key && in coap_dtls_context_set_pki() 1235 setup_data->pki_key.key.pem_buf.private_key[0]) { in coap_dtls_context_set_pki() 1238 setup_data->pki_key.key.pem_buf.private_key); in coap_dtls_context_set_pki() 1241 setup_data->pki_key.key.pem_buf.private_key); in coap_dtls_context_set_pki() 1261 setup_data->pki_key.key.pem_buf.private_key); in coap_dtls_context_set_pki() 1264 setup_data->pki_key.key.pem_buf.private_key); in coap_dtls_context_set_pki() 1295 if (setup_data->pki_key.key.asn1.private_key && in coap_dtls_context_set_pki() 1298 const uint8_t *private_key = setup_data->pki_key.key.asn1.private_key; in coap_dtls_context_set_pki() local 1303 setup_data->pki_key.key.asn1.private_key, in coap_dtls_context_set_pki() [all...] |
H A D | coap_openssl.c | 1143 if (setup_data->pki_key.key.pem.private_key && in setup_pki_server() 1144 setup_data->pki_key.key.pem.private_key[0]) { in setup_pki_server() 1146 setup_data->pki_key.key.pem.private_key, in setup_pki_server() 1150 setup_data->pki_key.key.pem.private_key); in setup_pki_server() 1221 if (setup_data->pki_key.key.pem_buf.private_key && in setup_pki_server() 1223 BIO *bp = BIO_new_mem_buf(setup_data->pki_key.key.pem_buf.private_key, in setup_pki_server() 1282 if (setup_data->pki_key.key.asn1.private_key && in setup_pki_server() 1286 setup_data->pki_key.key.asn1.private_key, in setup_pki_server() 1344 if (setup_data->pki_key.key.pkcs11.private_key && in setup_pki_server() 1345 setup_data->pki_key.key.pkcs11.private_key[ in setup_pki_server() [all...] |
/third_party/libwebsockets/lib/tls/ |
H A D | tls-network.c | 127 const char *private_key) in lws_tls_generic_cert_checks() 142 if (!cert || !private_key) in lws_tls_generic_cert_checks() 148 m = (int)lws_tls_use_any_upgrade_check_extant(private_key); in lws_tls_generic_cert_checks() 154 lwsl_vhost_notice(vhost, "Ignoring missing %s or %s", cert, private_key); in lws_tls_generic_cert_checks() 126 lws_tls_generic_cert_checks(struct lws_vhost *vhost, const char *cert, const char *private_key) lws_tls_generic_cert_checks() argument
|
H A D | private-network.h | 135 const char *cert, const char *private_key, 140 const char *private_key);
|
/third_party/libwebsockets/lib/tls/openssl/ |
H A D | openssl-server.c | 154 const char *cert, const char *private_key, 177 int n = (int)lws_tls_generic_cert_checks(vhost, cert, private_key), m; 179 if (!cert && !private_key) 202 private_key = NULL; 231 if (!private_key) { 236 if (SSL_CTX_use_PrivateKey_file(vhost->tls.ssl_ctx, private_key, 247 private_key, error, s); 284 if (lws_tls_alloc_pem_to_der_file(vhost->context, private_key, 387 if (n == LWS_TLS_EXTANT_ALTERNATIVE || !private_key) { 392 if (SSL_CTX_use_PrivateKey_file(vhost->tls.ssl_ctx, private_key, 153 lws_tls_server_certs_load(struct lws_vhost *vhost, struct lws *wsi, const char *cert, const char *private_key, const char *mem_cert, size_t mem_cert_len, const char *mem_privkey, size_t mem_privkey_len) global() argument [all...] |
/third_party/node/src/crypto/ |
H A D | crypto_ec.cc | 373 bool ECDH::IsKeyValidForCurve(const BignumPointer& private_key) { in IsKeyValidForCurve() argument 375 CHECK(private_key); in IsKeyValidForCurve() 378 if (BN_cmp(private_key.get(), BN_value_one()) < 0) { in IsKeyValidForCurve() 384 BN_cmp(private_key.get(), order.get()) < 0; in IsKeyValidForCurve() 464 KeyObjectHandle* private_key; in AdditionalConfig() local 470 ASSIGN_OR_RETURN_UNWRAP(&private_key, args[offset + 2], Nothing<bool>()); in AdditionalConfig() 472 if (private_key->Data()->GetKeyType() != kKeyTypePrivate || in AdditionalConfig() 479 params->private_ = private_key->Data(); in AdditionalConfig() 520 const EC_KEY* private_key; in DeriveBits() local 523 private_key in DeriveBits() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | tls_gnutls.c | 546 if (params->client_cert && params->private_key) { in tls_connection_set_params() 549 params->client_cert, params->private_key); in tls_connection_set_params() 552 conn->xcred, params->client_cert, params->private_key, in tls_connection_set_params() 557 conn->xcred, params->client_cert, params->private_key, in tls_connection_set_params() 567 params->private_key, GNUTLS_X509_FMT_PEM, in tls_connection_set_params() 572 params->private_key, GNUTLS_X509_FMT_PEM); in tls_connection_set_params() 586 } else if (params->private_key) { in tls_connection_set_params() 592 params->private_key); in tls_connection_set_params() 594 conn->xcred, params->private_key, GNUTLS_X509_FMT_DER, in tls_connection_set_params() 597 wpa_printf(MSG_DEBUG, "Failed to load private_key i in tls_connection_set_params() [all...] |
H A D | tls_openssl.c | 240 EVP_PKEY *private_key; /* the private key if using engine */ member 1185 conn->private_key = EVP_PKEY_from_keystore(key_id); in tls_engine_init() 1186 if (!conn->private_key) { in tls_engine_init() 1238 conn->private_key = ENGINE_load_private_key(conn->engine, in tls_engine_init() 1241 if (!conn->private_key) { in tls_engine_init() 1278 if (conn->private_key) { in tls_engine_init() 1279 EVP_PKEY_free(conn->private_key); in tls_engine_init() 1280 conn->private_key = NULL; in tls_engine_init() 1294 if (conn->private_key) { in tls_engine_deinit() 1295 EVP_PKEY_free(conn->private_key); in tls_engine_deinit() 3439 tls_read_pkcs12(struct tls_data *data, SSL *ssl, const char *private_key, const char *passwd) tls_read_pkcs12() argument 3636 tls_use_private_key_file(struct tls_data *data, SSL *ssl, const char *private_key, const char *private_key_passwd) tls_use_private_key_file() argument 3683 tls_connection_private_key(struct tls_data *data, struct tls_connection *conn, const char *private_key, const char *private_key_passwd, const u8 *private_key_blob, size_t private_key_blob_len) tls_connection_private_key() argument 3779 tls_global_private_key(struct tls_data *data, const char *private_key, const char *private_key_passwd) tls_global_private_key() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | tls_gnutls.c | 546 if (params->client_cert && params->private_key) { in tls_connection_set_params() 549 params->client_cert, params->private_key); in tls_connection_set_params() 552 conn->xcred, params->client_cert, params->private_key, in tls_connection_set_params() 557 conn->xcred, params->client_cert, params->private_key, in tls_connection_set_params() 567 params->private_key, GNUTLS_X509_FMT_PEM, in tls_connection_set_params() 572 params->private_key, GNUTLS_X509_FMT_PEM); in tls_connection_set_params() 586 } else if (params->private_key) { in tls_connection_set_params() 592 params->private_key); in tls_connection_set_params() 594 conn->xcred, params->private_key, GNUTLS_X509_FMT_DER, in tls_connection_set_params() 597 wpa_printf(MSG_DEBUG, "Failed to load private_key i in tls_connection_set_params() [all...] |
H A D | tls_openssl.c | 245 EVP_PKEY *private_key; /* the private key if using engine */ member 1224 conn->private_key = EVP_PKEY_from_keystore(key_id); in tls_engine_init() 1225 if (!conn->private_key) { in tls_engine_init() 1277 conn->private_key = ENGINE_load_private_key(conn->engine, in tls_engine_init() 1280 if (!conn->private_key) { in tls_engine_init() 1317 if (conn->private_key) { in tls_engine_init() 1318 EVP_PKEY_free(conn->private_key); in tls_engine_init() 1319 conn->private_key = NULL; in tls_engine_init() 1333 if (conn->private_key) { in tls_engine_deinit() 1334 EVP_PKEY_free(conn->private_key); in tls_engine_deinit() 3621 tls_read_pkcs12(struct tls_data *data, SSL *ssl, const char *private_key, const char *passwd) tls_read_pkcs12() argument 3818 tls_use_private_key_file(struct tls_data *data, SSL *ssl, const char *private_key, const char *private_key_passwd) tls_use_private_key_file() argument 3865 tls_use_cm_key(struct tls_data *data, SSL *ssl, const char *private_key) tls_use_cm_key() argument 3883 tls_connection_private_key(struct tls_data *data, struct tls_connection *conn, const char *private_key, const char *private_key_passwd, const u8 *private_key_blob, size_t private_key_blob_len) tls_connection_private_key() argument 4020 tls_global_private_key(struct tls_data *data, const char *private_key, const char *private_key_passwd) tls_global_private_key() argument [all...] |
/third_party/node/deps/openssl/openssl/crypto/asn1/ |
H A D | n_pkey.c | 28 ASN1_OCTET_STRING *private_key; member 53 ASN1_SIMPLE(NETSCAPE_PKEY, private_key, ASN1_OCTET_STRING)
|
/third_party/openssl/crypto/asn1/ |
H A D | n_pkey.c | 28 ASN1_OCTET_STRING *private_key; member 53 ASN1_SIMPLE(NETSCAPE_PKEY, private_key, ASN1_OCTET_STRING)
|
/third_party/node/deps/openssl/openssl/crypto/ec/curve448/ |
H A D | eddsa.c | 378 const uint8_t private_key[57], const uint8_t *context, in ossl_ed448_sign() 381 return ossl_c448_ed448_sign(ctx, out_sig, private_key, public_key, message, in ossl_ed448_sign() 398 const uint8_t public_key[57], const uint8_t private_key[57], in ossl_ed448ph_sign() 401 return ossl_c448_ed448_sign_prehash(ctx, out_sig, private_key, public_key, in ossl_ed448ph_sign() 419 const uint8_t private_key[57], const char *propq) in ossl_ed448_public_from_private() 421 return ossl_c448_ed448_derive_public_key(ctx, out_public_key, private_key, in ossl_ed448_public_from_private() 376 ossl_ed448_sign(OSSL_LIB_CTX *ctx, uint8_t *out_sig, const uint8_t *message, size_t message_len, const uint8_t public_key[57], const uint8_t private_key[57], const uint8_t *context, size_t context_len, const char *propq) ossl_ed448_sign() argument 397 ossl_ed448ph_sign(OSSL_LIB_CTX *ctx, uint8_t *out_sig, const uint8_t hash[64], const uint8_t public_key[57], const uint8_t private_key[57], const uint8_t *context, size_t context_len, const char *propq) ossl_ed448ph_sign() argument 418 ossl_ed448_public_from_private(OSSL_LIB_CTX *ctx, uint8_t out_public_key[57], const uint8_t private_key[57], const char *propq) ossl_ed448_public_from_private() argument
|
/third_party/openssl/crypto/ec/curve448/ |
H A D | eddsa.c | 378 const uint8_t private_key[57], const uint8_t *context, in ossl_ed448_sign() 381 return ossl_c448_ed448_sign(ctx, out_sig, private_key, public_key, message, in ossl_ed448_sign() 398 const uint8_t public_key[57], const uint8_t private_key[57], in ossl_ed448ph_sign() 401 return ossl_c448_ed448_sign_prehash(ctx, out_sig, private_key, public_key, in ossl_ed448ph_sign() 419 const uint8_t private_key[57], const char *propq) in ossl_ed448_public_from_private() 421 return ossl_c448_ed448_derive_public_key(ctx, out_public_key, private_key, in ossl_ed448_public_from_private() 376 ossl_ed448_sign(OSSL_LIB_CTX *ctx, uint8_t *out_sig, const uint8_t *message, size_t message_len, const uint8_t public_key[57], const uint8_t private_key[57], const uint8_t *context, size_t context_len, const char *propq) ossl_ed448_sign() argument 397 ossl_ed448ph_sign(OSSL_LIB_CTX *ctx, uint8_t *out_sig, const uint8_t hash[64], const uint8_t public_key[57], const uint8_t private_key[57], const uint8_t *context, size_t context_len, const char *propq) ossl_ed448ph_sign() argument 418 ossl_ed448_public_from_private(OSSL_LIB_CTX *ctx, uint8_t out_public_key[57], const uint8_t private_key[57], const char *propq) ossl_ed448_public_from_private() argument
|
/third_party/node/test/fixtures/0-dns/ |
H A D | create-cert.js | 13 const private_key = fs.readFileSync('./0-dns-key.pem'); 64 const signature = sign.sign(private_key);
|
/third_party/mbedtls/library/ |
H A D | lmots.c | 632 ctx->private_key[i_digit_idx], in mbedtls_lmots_generate_private_key() 662 (unsigned char *) priv_ctx->private_key, NULL, in mbedtls_lmots_calculate_public_key() 730 ret = hash_digit_array(&ctx->params, (unsigned char *) ctx->private_key, in mbedtls_lmots_sign() 754 mbedtls_platform_zeroize(ctx->private_key, in mbedtls_lmots_sign() 755 sizeof(ctx->private_key)); in mbedtls_lmots_sign()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
H A D | rsa.c | 18 int private_key; /* whether private key is set */ member 21 /* The following parameters are available only if private_key is set */ 160 key->private_key = 1; in crypto_rsa_import_private_key() 272 if (use_private && !key->private_key) in crypto_rsa_exptmod()
|