/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | crypto_gnutls.c | 286 int crypto_dh_init(u8 generator, const u8 *prime, size_t prime_len, u8 *privkey, in crypto_dh_init() argument 291 if (os_get_random(privkey, prime_len) < 0) in crypto_dh_init() 293 if (os_memcmp(privkey, prime, prime_len) > 0) { in crypto_dh_init() 295 privkey[0] = 0; in crypto_dh_init() 299 if (crypto_mod_exp(&generator, 1, privkey, prime_len, prime, prime_len, in crypto_dh_init() 314 const u8 *privkey, size_t privkey_len, in crypto_dh_derive_secret() 353 res = crypto_mod_exp(pubkey, pubkey_len, privkey, privkey_len, in crypto_dh_derive_secret() 312 crypto_dh_derive_secret(u8 generator, const u8 *prime, size_t prime_len, const u8 *order, size_t order_len, const u8 *privkey, size_t privkey_len, const u8 *pubkey, size_t pubkey_len, u8 *secret, size_t *len) crypto_dh_derive_secret() argument
|
H A D | crypto_nettle.c | 307 int crypto_dh_init(u8 generator, const u8 *prime, size_t prime_len, u8 *privkey, in crypto_dh_init() argument 312 if (os_get_random(privkey, prime_len) < 0) in crypto_dh_init() 314 if (os_memcmp(privkey, prime, prime_len) > 0) { in crypto_dh_init() 316 privkey[0] = 0; in crypto_dh_init() 320 if (crypto_mod_exp(&generator, 1, privkey, prime_len, prime, prime_len, in crypto_dh_init() 335 const u8 *privkey, size_t privkey_len, in crypto_dh_derive_secret() 367 res = crypto_mod_exp(pubkey, pubkey_len, privkey, privkey_len, in crypto_dh_derive_secret() 333 crypto_dh_derive_secret(u8 generator, const u8 *prime, size_t prime_len, const u8 *order, size_t order_len, const u8 *privkey, size_t privkey_len, const u8 *pubkey, size_t pubkey_len, u8 *secret, size_t *len) crypto_dh_derive_secret() argument
|
H A D | crypto_libtomcrypt.c | 700 int crypto_dh_init(u8 generator, const u8 *prime, size_t prime_len, u8 *privkey, in crypto_dh_init() argument 705 if (os_get_random(privkey, prime_len) < 0) in crypto_dh_init() 707 if (os_memcmp(privkey, prime, prime_len) > 0) { in crypto_dh_init() 709 privkey[0] = 0; in crypto_dh_init() 713 if (crypto_mod_exp(&generator, 1, privkey, prime_len, prime, prime_len, in crypto_dh_init() 728 const u8 *privkey, size_t privkey_len, in crypto_dh_derive_secret() 733 return crypto_mod_exp(pubkey, pubkey_len, privkey, privkey_len, in crypto_dh_derive_secret() 726 crypto_dh_derive_secret(u8 generator, const u8 *prime, size_t prime_len, const u8 *order, size_t order_len, const u8 *privkey, size_t privkey_len, const u8 *pubkey, size_t pubkey_len, u8 *secret, size_t *len) crypto_dh_derive_secret() argument
|
H A D | crypto_wolfssl.c | 645 struct wpabuf *privkey = NULL; in dh5_init() local 663 privkey = wpabuf_alloc(RFC3526_LEN); in dh5_init() 665 if (!privkey || !pubkey) in dh5_init() 673 if (wc_DhGenerateKeyPair(dh, &rng, wpabuf_mhead(privkey), &priv_sz, in dh5_init() 677 wpabuf_put(privkey, priv_sz); in dh5_init() 681 *priv = privkey; in dh5_init() 684 privkey = NULL; in dh5_init() 688 wpabuf_clear_free(privkey); in dh5_init() 782 int crypto_dh_init(u8 generator, const u8 *prime, size_t prime_len, u8 *privkey, in crypto_dh_init() argument 806 if (wc_DhGenerateKeyPair(dh, &rng, privkey, in crypto_dh_init() 832 crypto_dh_derive_secret(u8 generator, const u8 *prime, size_t prime_len, const u8 *order, size_t order_len, const u8 *privkey, size_t privkey_len, const u8 *pubkey, size_t pubkey_len, u8 *secret, size_t *len) crypto_dh_derive_secret() argument [all...] |
H A D | crypto_openssl.c | 593 int crypto_dh_init(u8 generator, const u8 *prime, size_t prime_len, u8 *privkey, in crypto_dh_init() argument 598 if (os_get_random(privkey, prime_len) < 0) in crypto_dh_init() 600 if (os_memcmp(privkey, prime, prime_len) > 0) { in crypto_dh_init() 602 privkey[0] = 0; in crypto_dh_init() 606 if (crypto_mod_exp(&generator, 1, privkey, prime_len, prime, prime_len, in crypto_dh_init() 621 const u8 *privkey, size_t privkey_len, in crypto_dh_derive_secret() 653 res = crypto_mod_exp(pubkey, pubkey_len, privkey, privkey_len, in crypto_dh_derive_secret() 826 struct wpabuf *pubkey = NULL, *privkey = NULL; in dh5_init() local 857 privkey = wpabuf_alloc(privlen); in dh5_init() 858 if (privkey in dh5_init() 619 crypto_dh_derive_secret(u8 generator, const u8 *prime, size_t prime_len, const u8 *order, size_t order_len, const u8 *privkey, size_t privkey_len, const u8 *pubkey, size_t pubkey_len, u8 *secret, size_t *len) crypto_dh_derive_secret() argument [all...] |
/third_party/node/deps/openssl/openssl/providers/implementations/signature/ |
H A D | eddsa_sig.c | 167 if (edkey->privkey == NULL) { in ed25519_digest_sign() 181 if (ossl_ed25519_sign(sigret, tbs, tbslen, edkey->pubkey, edkey->privkey, in ed25519_digest_sign() 208 if (edkey->privkey == NULL) { in ed448_digest_sign() 223 edkey->privkey, NULL, 0, edkey->propq) == 0) { in ed448_digest_sign() 383 memcpy(param.ed25519.priv, edkey->privkey, sizeof(param.ed25519.priv)); in s390x_ed25519_digestsign() 408 memcpy(param.ed448.priv + 64 - 57, edkey->privkey, 57); in s390x_ed448_digestsign()
|
/third_party/node/deps/openssl/openssl/crypto/ec/curve448/ |
H A D | eddsa.c | 114 const uint8_t privkey[EDDSA_448_PRIVATE_BYTES], in ossl_c448_ed448_derive_public_key() 124 privkey, in ossl_c448_ed448_derive_public_key() 161 const uint8_t privkey[EDDSA_448_PRIVATE_BYTES], in ossl_c448_ed448_sign() 185 if (!oneshot_hash(ctx, expanded, sizeof(expanded), privkey, in ossl_c448_ed448_sign() 270 const uint8_t privkey[EDDSA_448_PRIVATE_BYTES], in ossl_c448_ed448_sign_prehash() 275 return ossl_c448_ed448_sign(ctx, signature, privkey, pubkey, hash, 64, 1, in ossl_c448_ed448_sign_prehash() 111 ossl_c448_ed448_derive_public_key( OSSL_LIB_CTX *ctx, uint8_t pubkey[EDDSA_448_PUBLIC_BYTES], const uint8_t privkey[EDDSA_448_PRIVATE_BYTES], const char *propq) ossl_c448_ed448_derive_public_key() argument 159 ossl_c448_ed448_sign(OSSL_LIB_CTX *ctx, uint8_t signature[EDDSA_448_SIGNATURE_BYTES], const uint8_t privkey[EDDSA_448_PRIVATE_BYTES], const uint8_t pubkey[EDDSA_448_PUBLIC_BYTES], const uint8_t *message, size_t message_len, uint8_t prehashed, const uint8_t *context, size_t context_len, const char *propq) ossl_c448_ed448_sign() argument 267 ossl_c448_ed448_sign_prehash( OSSL_LIB_CTX *ctx, uint8_t signature[EDDSA_448_SIGNATURE_BYTES], const uint8_t privkey[EDDSA_448_PRIVATE_BYTES], const uint8_t pubkey[EDDSA_448_PUBLIC_BYTES], const uint8_t hash[64], const uint8_t *context, size_t context_len, const char *propq) ossl_c448_ed448_sign_prehash() argument
|
/third_party/openssl/crypto/ec/curve448/ |
H A D | eddsa.c | 114 const uint8_t privkey[EDDSA_448_PRIVATE_BYTES], in ossl_c448_ed448_derive_public_key() 124 privkey, in ossl_c448_ed448_derive_public_key() 161 const uint8_t privkey[EDDSA_448_PRIVATE_BYTES], in ossl_c448_ed448_sign() 185 if (!oneshot_hash(ctx, expanded, sizeof(expanded), privkey, in ossl_c448_ed448_sign() 270 const uint8_t privkey[EDDSA_448_PRIVATE_BYTES], in ossl_c448_ed448_sign_prehash() 275 return ossl_c448_ed448_sign(ctx, signature, privkey, pubkey, hash, 64, 1, in ossl_c448_ed448_sign_prehash() 111 ossl_c448_ed448_derive_public_key( OSSL_LIB_CTX *ctx, uint8_t pubkey[EDDSA_448_PUBLIC_BYTES], const uint8_t privkey[EDDSA_448_PRIVATE_BYTES], const char *propq) ossl_c448_ed448_derive_public_key() argument 159 ossl_c448_ed448_sign(OSSL_LIB_CTX *ctx, uint8_t signature[EDDSA_448_SIGNATURE_BYTES], const uint8_t privkey[EDDSA_448_PRIVATE_BYTES], const uint8_t pubkey[EDDSA_448_PUBLIC_BYTES], const uint8_t *message, size_t message_len, uint8_t prehashed, const uint8_t *context, size_t context_len, const char *propq) ossl_c448_ed448_sign() argument 267 ossl_c448_ed448_sign_prehash( OSSL_LIB_CTX *ctx, uint8_t signature[EDDSA_448_SIGNATURE_BYTES], const uint8_t privkey[EDDSA_448_PRIVATE_BYTES], const uint8_t pubkey[EDDSA_448_PUBLIC_BYTES], const uint8_t hash[64], const uint8_t *context, size_t context_len, const char *propq) ossl_c448_ed448_sign_prehash() argument
|
/third_party/openssl/providers/implementations/signature/ |
H A D | eddsa_sig.c | 167 if (edkey->privkey == NULL) { in ed25519_digest_sign() 181 if (ossl_ed25519_sign(sigret, tbs, tbslen, edkey->pubkey, edkey->privkey, in ed25519_digest_sign() 208 if (edkey->privkey == NULL) { in ed448_digest_sign() 223 edkey->privkey, NULL, 0, edkey->propq) == 0) { in ed448_digest_sign() 383 memcpy(param.ed25519.priv, edkey->privkey, sizeof(param.ed25519.priv)); in s390x_ed25519_digestsign() 408 memcpy(param.ed448.priv + 64 - 57, edkey->privkey, 57); in s390x_ed448_digestsign()
|
/third_party/node/deps/openssl/openssl/apps/ |
H A D | x509.c | 261 EVP_PKEY *privkey = NULL, *CAkey = NULL, *pubkey = NULL; in x509_main() local 630 privkey = load_key(privkeyfile, keyformat, 0, passin, e, "private key"); in x509_main() 631 if (privkey == NULL) in x509_main() 761 if ((pubkey != NULL || privkey != NULL || req != NULL) in x509_main() 763 privkey != NULL ? privkey : in x509_main() 822 if (reqfile || newcert || privkey != NULL || CAfile != NULL) { in x509_main() 832 if (!X509V3_set_issuer_pkey(&ext_ctx, privkey)) in x509_main() 853 if (privkey == NULL) { in x509_main() 871 if (!do_X509_REQ_sign(rq, privkey, diges in x509_main() [all...] |
/third_party/openssl/apps/ |
H A D | x509.c | 261 EVP_PKEY *privkey = NULL, *CAkey = NULL, *pubkey = NULL; in x509_main() local 630 privkey = load_key(privkeyfile, keyformat, 0, passin, e, "private key"); in x509_main() 631 if (privkey == NULL) in x509_main() 761 if ((pubkey != NULL || privkey != NULL || req != NULL) in x509_main() 763 privkey != NULL ? privkey : in x509_main() 822 if (reqfile || newcert || privkey != NULL || CAfile != NULL) { in x509_main() 832 if (!X509V3_set_issuer_pkey(&ext_ctx, privkey)) in x509_main() 853 if (privkey == NULL) { in x509_main() 871 if (!do_X509_REQ_sign(rq, privkey, diges in x509_main() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | crypto_libtomcrypt.c | 700 int crypto_dh_init(u8 generator, const u8 *prime, size_t prime_len, u8 *privkey, in crypto_dh_init() argument 705 if (os_get_random(privkey, prime_len) < 0) in crypto_dh_init() 707 if (os_memcmp(privkey, prime, prime_len) > 0) { in crypto_dh_init() 709 privkey[0] = 0; in crypto_dh_init() 713 if (crypto_mod_exp(&generator, 1, privkey, prime_len, prime, prime_len, in crypto_dh_init() 728 const u8 *privkey, size_t privkey_len, in crypto_dh_derive_secret() 733 return crypto_mod_exp(pubkey, pubkey_len, privkey, privkey_len, in crypto_dh_derive_secret() 726 crypto_dh_derive_secret(u8 generator, const u8 *prime, size_t prime_len, const u8 *order, size_t order_len, const u8 *privkey, size_t privkey_len, const u8 *pubkey, size_t pubkey_len, u8 *secret, size_t *len) crypto_dh_derive_secret() argument
|
H A D | crypto_openssl.c | 520 int crypto_dh_init(u8 generator, const u8 *prime, size_t prime_len, u8 *privkey, in crypto_dh_init() argument 525 if (os_get_random(privkey, prime_len) < 0) in crypto_dh_init() 527 if (os_memcmp(privkey, prime, prime_len) > 0) { in crypto_dh_init() 529 privkey[0] = 0; in crypto_dh_init() 533 if (crypto_mod_exp(&generator, 1, privkey, prime_len, prime, prime_len, in crypto_dh_init() 548 const u8 *privkey, size_t privkey_len, in crypto_dh_derive_secret() 580 res = crypto_mod_exp(pubkey, pubkey_len, privkey, privkey_len, in crypto_dh_derive_secret() 753 struct wpabuf *pubkey = NULL, *privkey = NULL; in dh5_init() local 784 privkey = wpabuf_alloc(privlen); in dh5_init() 785 if (privkey in dh5_init() 546 crypto_dh_derive_secret(u8 generator, const u8 *prime, size_t prime_len, const u8 *order, size_t order_len, const u8 *privkey, size_t privkey_len, const u8 *pubkey, size_t pubkey_len, u8 *secret, size_t *len) crypto_dh_derive_secret() argument [all...] |
H A D | crypto_wolfssl.c | 645 struct wpabuf *privkey = NULL; in dh5_init() local 663 privkey = wpabuf_alloc(RFC3526_LEN); in dh5_init() 665 if (!privkey || !pubkey) in dh5_init() 673 if (wc_DhGenerateKeyPair(dh, &rng, wpabuf_mhead(privkey), &priv_sz, in dh5_init() 677 wpabuf_put(privkey, priv_sz); in dh5_init() 681 *priv = privkey; in dh5_init() 684 privkey = NULL; in dh5_init() 688 wpabuf_clear_free(privkey); in dh5_init() 778 int crypto_dh_init(u8 generator, const u8 *prime, size_t prime_len, u8 *privkey, in crypto_dh_init() argument 802 if (wc_DhGenerateKeyPair(dh, &rng, privkey, in crypto_dh_init() 828 crypto_dh_derive_secret(u8 generator, const u8 *prime, size_t prime_len, const u8 *order, size_t order_len, const u8 *privkey, size_t privkey_len, const u8 *pubkey, size_t pubkey_len, u8 *secret, size_t *len) crypto_dh_derive_secret() argument [all...] |
/third_party/node/lib/internal/crypto/ |
H A D | keygen.js | 92 let { 0: pubkey, 1: privkey } = result; 94 privkey = wrapKey(privkey, PrivateKeyObject); 95 FunctionPrototypeCall(callback, job, null, pubkey, privkey);
|
/third_party/openssl/test/ |
H A D | servername_test.c | 32 static char *privkey = NULL; variable 211 &sctx, &cctx, cert, privkey)) in server_setup_sni() 263 || !TEST_ptr(privkey = test_get_argument(1))) in setup_tests()
|
H A D | sslcorrupttest.c | 180 static char *privkey = NULL; variable 200 &sctx, &cctx, cert, privkey))) in test_ssl_corrupt() 267 || !TEST_ptr(privkey = test_get_argument(1))) in setup_tests()
|
H A D | sslapitest.c | 85 static char *privkey = NULL; variable 366 &sctx, &cctx, cert, privkey))) in test_keylog() 449 &sctx, &cctx, cert, privkey)) in test_keylog_no_master_key() 760 &sctx, &cctx, cert, privkey))) in test_client_hello_cb() 802 &sctx, &cctx, cert, privkey)) { in test_no_ems() 862 &sctx, &cctx, cert, privkey)) in test_ccs_change_cipher() 977 privkey))) in execute_test_large_message() 1179 &sctx, &cctx, cert, privkey))) in execute_test_ktls() 1318 &sctx, &cctx, cert, privkey))) in execute_test_ktls_sendfile() 1610 &sctx, &cctx, cert, privkey))) in test_large_app_data() [all...] |
H A D | threadstest.c | 32 static char *privkey; variable 515 if (!TEST_ptr(shared_evp_pkey = load_pkey_pem(privkey, multi_libctx))) in test_multi() 708 privkey = test_mk_file_path(datadir, "rsakey.pem"); in setup_tests() 709 if (!TEST_ptr(privkey)) in setup_tests() 727 OPENSSL_free(privkey); in cleanup_tests()
|
H A D | tls13ccstest.c | 17 static char *privkey = NULL; variable 259 &sctx, &cctx, cert, privkey)) in test_tls13ccs() 501 || !TEST_ptr(privkey = test_get_argument(1))) in setup_tests()
|
H A D | asynciotest.c | 25 static char *privkey = NULL; variable 302 &serverctx, &clientctx, cert, privkey))) in test_asyncio() 397 OPT_TEST_DECLARE_USAGE("certname privkey\n") 407 || !TEST_ptr(privkey = test_get_argument(1))) in setup_tests()
|
/kernel/linux/linux-6.6/tools/net/ynl/generated/ |
H A D | handshake-user.h | 28 __u32 privkey:1; member 32 __u32 privkey; member
|
/third_party/node/deps/openssl/openssl/crypto/ec/ |
H A D | ecp_s390x_nistp.c | 137 const BIGNUM *privkey; in ecdsa_s390x_nistp_sign_sig() local 141 privkey = EC_KEY_get0_private_key(eckey); in ecdsa_s390x_nistp_sign_sig() 142 if (group == NULL || privkey == NULL) { in ecdsa_s390x_nistp_sign_sig() 170 if (BN_bn2binpad(privkey, param + S390X_OFF_K(len), len) == -1) { in ecdsa_s390x_nistp_sign_sig()
|
/third_party/openssl/crypto/ec/ |
H A D | ecp_s390x_nistp.c | 137 const BIGNUM *privkey; in ecdsa_s390x_nistp_sign_sig() local 141 privkey = EC_KEY_get0_private_key(eckey); in ecdsa_s390x_nistp_sign_sig() 142 if (group == NULL || privkey == NULL) { in ecdsa_s390x_nistp_sign_sig() 170 if (BN_bn2binpad(privkey, param + S390X_OFF_K(len), len) == -1) { in ecdsa_s390x_nistp_sign_sig()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/ |
H A D | dpp_i.h | 97 const u8 *privkey, size_t privkey_len); 99 const u8 *privkey, size_t privkey_len);
|