Home
last modified time | relevance | path

Searched refs:private_key (Results 1 - 25 of 97) sorted by relevance

1234

/third_party/node/deps/openssl/openssl/include/crypto/
H A Decx.h87 int ossl_x25519(uint8_t out_shared_key[32], const uint8_t private_key[32],
90 const uint8_t private_key[32]);
94 const uint8_t private_key[32],
98 const uint8_t public_key[32], const uint8_t private_key[32],
107 const uint8_t private_key[57], const char *propq);
111 const uint8_t private_key[57], const uint8_t *context,
120 ossl_x448(uint8_t out_shared_key[56], const uint8_t private_key[56],
124 const uint8_t private_key[56]);
/third_party/openssl/include/crypto/
H A Decx.h87 int ossl_x25519(uint8_t out_shared_key[32], const uint8_t private_key[32],
90 const uint8_t private_key[32]);
94 const uint8_t private_key[32],
98 const uint8_t public_key[32], const uint8_t private_key[32],
107 const uint8_t private_key[57], const char *propq);
111 const uint8_t private_key[57], const uint8_t *context,
120 ossl_x448(uint8_t out_shared_key[56], const uint8_t private_key[56],
124 const uint8_t private_key[56]);
/third_party/rust/crates/rust-openssl/openssl/src/
H A Decdsa.rs164 let private_key = EcKey::generate(&group).unwrap(); in sign_and_verify()
165 let public_key = get_public_key(&group, &private_key).unwrap(); in sign_and_verify()
171 let res = EcdsaSig::sign(data.as_bytes(), &private_key).unwrap(); in sign_and_verify()
192 let private_key = EcKey::generate(&group).unwrap(); in check_private_components()
193 let public_key = get_public_key(&group, &private_key).unwrap(); in check_private_components()
195 let res = EcdsaSig::sign(data.as_bytes(), &private_key).unwrap(); in check_private_components()
212 let private_key = EcKey::generate(&group).unwrap(); in serialize_deserialize()
213 let public_key = get_public_key(&group, &private_key).unwrap(); in serialize_deserialize()
216 let res = EcdsaSig::sign(data.as_bytes(), &private_key).unwrap(); in serialize_deserialize()
H A Ddh.rs262 pub fn private_key(&self) -> &BigNumRef { in private_key() functions
393 .set_private_key(key1.private_key().to_owned().unwrap()) in test_dh_stored_restored()
397 assert_eq!(key1.private_key(), key2.private_key()); in test_dh_stored_restored()
417 key1.private_key().to_owned().unwrap(), in test_set_keys()
421 assert_eq!(key1.private_key(), key3.private_key()); in test_set_keys()
H A Dsign.rs676 let private_key = Rsa::private_key_from_pem(key).unwrap(); in rsa_sign()
677 let pkey = PKey::from_rsa(private_key).unwrap(); in rsa_sign()
691 let private_key = Rsa::private_key_from_pem(key).unwrap(); in rsa_verify_ok()
692 let pkey = PKey::from_rsa(private_key).unwrap(); in rsa_verify_ok()
703 let private_key = Rsa::private_key_from_pem(key).unwrap(); in rsa_verify_invalid()
704 let pkey = PKey::from_rsa(private_key).unwrap(); in rsa_verify_invalid()
864 let private_key = Rsa::private_key_from_pem(key).unwrap(); in rsa_sign_verify()
865 let pkey = PKey::from_rsa(private_key).unwrap(); in rsa_sign_verify()
H A Dencrypt.rs200 /// # let private_key = Rsa::private_key_from_pem(key).unwrap();
201 /// # let pkey = PKey::from_rsa(private_key).unwrap();
419 /// # let private_key = Rsa::private_key_from_pem(key).unwrap();
420 /// # let pkey = PKey::from_rsa(private_key).unwrap();
494 let private_key = Rsa::private_key_from_pem(key).unwrap(); in rsa_encrypt_decrypt()
495 let pkey = PKey::from_rsa(private_key).unwrap(); in rsa_encrypt_decrypt()
519 let private_key = Rsa::private_key_from_pem(key).unwrap(); in rsa_encrypt_decrypt_with_sha256()
520 let pkey = PKey::from_rsa(private_key).unwrap(); in rsa_encrypt_decrypt_with_sha256()
550 let private_key = Rsa::private_key_from_pem(key).unwrap(); in rsa_encrypt_decrypt_oaep_label()
551 let pkey = PKey::from_rsa(private_key) in rsa_encrypt_decrypt_oaep_label()
[all...]
/third_party/libcoap/include/coap3/
H A Dcoap_dtls.h201 const char *private_key; /**< File location of Private Key in PEM format */ member
216 const uint8_t *private_key; /**< PEM buffer Private Key member
218 for both the public_cert and private_key */
230 const uint8_t *private_key; /**< ASN1 (DER) Private Key */ member
243 const char *private_key; /**< pkcs11: URI for Private Key */ member
/third_party/libcoap/src/
H A Dcoap_mbedtls.c127 mbedtls_pk_context private_key; member
143 mbedtls_pk_context private_key; member
499 mbedtls_pk_context *private_key, in setup_pki_credentials()
515 setup_data->pki_key.key.pem.private_key && in setup_pki_credentials()
516 setup_data->pki_key.key.pem.private_key[0]) { in setup_pki_credentials()
519 mbedtls_pk_init(private_key); in setup_pki_credentials()
530 ret = mbedtls_pk_parse_keyfile(private_key, in setup_pki_credentials()
531 setup_data->pki_key.key.pem.private_key, NULL); in setup_pki_credentials()
533 ret = mbedtls_pk_parse_keyfile(private_key, in setup_pki_credentials()
534 setup_data->pki_key.key.pem.private_key, in setup_pki_credentials()
497 setup_pki_credentials(mbedtls_x509_crt *cacert, mbedtls_x509_crt *public_cert, mbedtls_pk_context *private_key, coap_mbedtls_env_t *m_env, coap_mbedtls_context_t *m_context, coap_session_t *c_session, coap_dtls_pki_t *setup_data, coap_dtls_role_t role) setup_pki_credentials() argument
[all...]
H A Dcoap_tinydtls.c1234 setup_data->pki_key.key.pem_buf.private_key && in coap_dtls_context_set_pki()
1235 setup_data->pki_key.key.pem_buf.private_key[0]) { in coap_dtls_context_set_pki()
1238 setup_data->pki_key.key.pem_buf.private_key); in coap_dtls_context_set_pki()
1241 setup_data->pki_key.key.pem_buf.private_key); in coap_dtls_context_set_pki()
1261 setup_data->pki_key.key.pem_buf.private_key); in coap_dtls_context_set_pki()
1264 setup_data->pki_key.key.pem_buf.private_key); in coap_dtls_context_set_pki()
1295 if (setup_data->pki_key.key.asn1.private_key && in coap_dtls_context_set_pki()
1298 const uint8_t *private_key = setup_data->pki_key.key.asn1.private_key; in coap_dtls_context_set_pki() local
1303 setup_data->pki_key.key.asn1.private_key, in coap_dtls_context_set_pki()
[all...]
H A Dcoap_openssl.c1143 if (setup_data->pki_key.key.pem.private_key && in setup_pki_server()
1144 setup_data->pki_key.key.pem.private_key[0]) { in setup_pki_server()
1146 setup_data->pki_key.key.pem.private_key, in setup_pki_server()
1150 setup_data->pki_key.key.pem.private_key); in setup_pki_server()
1221 if (setup_data->pki_key.key.pem_buf.private_key && in setup_pki_server()
1223 BIO *bp = BIO_new_mem_buf(setup_data->pki_key.key.pem_buf.private_key, in setup_pki_server()
1282 if (setup_data->pki_key.key.asn1.private_key && in setup_pki_server()
1286 setup_data->pki_key.key.asn1.private_key, in setup_pki_server()
1344 if (setup_data->pki_key.key.pkcs11.private_key && in setup_pki_server()
1345 setup_data->pki_key.key.pkcs11.private_key[ in setup_pki_server()
[all...]
/third_party/libwebsockets/lib/tls/
H A Dtls-network.c127 const char *private_key) in lws_tls_generic_cert_checks()
142 if (!cert || !private_key) in lws_tls_generic_cert_checks()
148 m = (int)lws_tls_use_any_upgrade_check_extant(private_key); in lws_tls_generic_cert_checks()
154 lwsl_vhost_notice(vhost, "Ignoring missing %s or %s", cert, private_key); in lws_tls_generic_cert_checks()
126 lws_tls_generic_cert_checks(struct lws_vhost *vhost, const char *cert, const char *private_key) lws_tls_generic_cert_checks() argument
H A Dprivate-network.h135 const char *cert, const char *private_key,
140 const char *private_key);
/third_party/libwebsockets/lib/tls/openssl/
H A Dopenssl-server.c154 const char *cert, const char *private_key,
177 int n = (int)lws_tls_generic_cert_checks(vhost, cert, private_key), m;
179 if (!cert && !private_key)
202 private_key = NULL;
231 if (!private_key) {
236 if (SSL_CTX_use_PrivateKey_file(vhost->tls.ssl_ctx, private_key,
247 private_key, error, s);
284 if (lws_tls_alloc_pem_to_der_file(vhost->context, private_key,
387 if (n == LWS_TLS_EXTANT_ALTERNATIVE || !private_key) {
392 if (SSL_CTX_use_PrivateKey_file(vhost->tls.ssl_ctx, private_key,
153 lws_tls_server_certs_load(struct lws_vhost *vhost, struct lws *wsi, const char *cert, const char *private_key, const char *mem_cert, size_t mem_cert_len, const char *mem_privkey, size_t mem_privkey_len) global() argument
[all...]
/third_party/node/src/crypto/
H A Dcrypto_ec.cc373 bool ECDH::IsKeyValidForCurve(const BignumPointer& private_key) { in IsKeyValidForCurve() argument
375 CHECK(private_key); in IsKeyValidForCurve()
378 if (BN_cmp(private_key.get(), BN_value_one()) < 0) { in IsKeyValidForCurve()
384 BN_cmp(private_key.get(), order.get()) < 0; in IsKeyValidForCurve()
464 KeyObjectHandle* private_key; in AdditionalConfig() local
470 ASSIGN_OR_RETURN_UNWRAP(&private_key, args[offset + 2], Nothing<bool>()); in AdditionalConfig()
472 if (private_key->Data()->GetKeyType() != kKeyTypePrivate || in AdditionalConfig()
479 params->private_ = private_key->Data(); in AdditionalConfig()
520 const EC_KEY* private_key; in DeriveBits() local
523 private_key in DeriveBits()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
H A Dtls_gnutls.c546 if (params->client_cert && params->private_key) { in tls_connection_set_params()
549 params->client_cert, params->private_key); in tls_connection_set_params()
552 conn->xcred, params->client_cert, params->private_key, in tls_connection_set_params()
557 conn->xcred, params->client_cert, params->private_key, in tls_connection_set_params()
567 params->private_key, GNUTLS_X509_FMT_PEM, in tls_connection_set_params()
572 params->private_key, GNUTLS_X509_FMT_PEM); in tls_connection_set_params()
586 } else if (params->private_key) { in tls_connection_set_params()
592 params->private_key); in tls_connection_set_params()
594 conn->xcred, params->private_key, GNUTLS_X509_FMT_DER, in tls_connection_set_params()
597 wpa_printf(MSG_DEBUG, "Failed to load private_key i in tls_connection_set_params()
[all...]
H A Dtls_openssl.c240 EVP_PKEY *private_key; /* the private key if using engine */ member
1185 conn->private_key = EVP_PKEY_from_keystore(key_id); in tls_engine_init()
1186 if (!conn->private_key) { in tls_engine_init()
1238 conn->private_key = ENGINE_load_private_key(conn->engine, in tls_engine_init()
1241 if (!conn->private_key) { in tls_engine_init()
1278 if (conn->private_key) { in tls_engine_init()
1279 EVP_PKEY_free(conn->private_key); in tls_engine_init()
1280 conn->private_key = NULL; in tls_engine_init()
1294 if (conn->private_key) { in tls_engine_deinit()
1295 EVP_PKEY_free(conn->private_key); in tls_engine_deinit()
3439 tls_read_pkcs12(struct tls_data *data, SSL *ssl, const char *private_key, const char *passwd) tls_read_pkcs12() argument
3636 tls_use_private_key_file(struct tls_data *data, SSL *ssl, const char *private_key, const char *private_key_passwd) tls_use_private_key_file() argument
3683 tls_connection_private_key(struct tls_data *data, struct tls_connection *conn, const char *private_key, const char *private_key_passwd, const u8 *private_key_blob, size_t private_key_blob_len) tls_connection_private_key() argument
3779 tls_global_private_key(struct tls_data *data, const char *private_key, const char *private_key_passwd) tls_global_private_key() argument
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
H A Dtls_gnutls.c546 if (params->client_cert && params->private_key) { in tls_connection_set_params()
549 params->client_cert, params->private_key); in tls_connection_set_params()
552 conn->xcred, params->client_cert, params->private_key, in tls_connection_set_params()
557 conn->xcred, params->client_cert, params->private_key, in tls_connection_set_params()
567 params->private_key, GNUTLS_X509_FMT_PEM, in tls_connection_set_params()
572 params->private_key, GNUTLS_X509_FMT_PEM); in tls_connection_set_params()
586 } else if (params->private_key) { in tls_connection_set_params()
592 params->private_key); in tls_connection_set_params()
594 conn->xcred, params->private_key, GNUTLS_X509_FMT_DER, in tls_connection_set_params()
597 wpa_printf(MSG_DEBUG, "Failed to load private_key i in tls_connection_set_params()
[all...]
H A Dtls_openssl.c245 EVP_PKEY *private_key; /* the private key if using engine */ member
1224 conn->private_key = EVP_PKEY_from_keystore(key_id); in tls_engine_init()
1225 if (!conn->private_key) { in tls_engine_init()
1277 conn->private_key = ENGINE_load_private_key(conn->engine, in tls_engine_init()
1280 if (!conn->private_key) { in tls_engine_init()
1317 if (conn->private_key) { in tls_engine_init()
1318 EVP_PKEY_free(conn->private_key); in tls_engine_init()
1319 conn->private_key = NULL; in tls_engine_init()
1333 if (conn->private_key) { in tls_engine_deinit()
1334 EVP_PKEY_free(conn->private_key); in tls_engine_deinit()
3621 tls_read_pkcs12(struct tls_data *data, SSL *ssl, const char *private_key, const char *passwd) tls_read_pkcs12() argument
3818 tls_use_private_key_file(struct tls_data *data, SSL *ssl, const char *private_key, const char *private_key_passwd) tls_use_private_key_file() argument
3865 tls_use_cm_key(struct tls_data *data, SSL *ssl, const char *private_key) tls_use_cm_key() argument
3883 tls_connection_private_key(struct tls_data *data, struct tls_connection *conn, const char *private_key, const char *private_key_passwd, const u8 *private_key_blob, size_t private_key_blob_len) tls_connection_private_key() argument
4020 tls_global_private_key(struct tls_data *data, const char *private_key, const char *private_key_passwd) tls_global_private_key() argument
[all...]
/third_party/node/deps/openssl/openssl/crypto/asn1/
H A Dn_pkey.c28 ASN1_OCTET_STRING *private_key; member
53 ASN1_SIMPLE(NETSCAPE_PKEY, private_key, ASN1_OCTET_STRING)
/third_party/openssl/crypto/asn1/
H A Dn_pkey.c28 ASN1_OCTET_STRING *private_key; member
53 ASN1_SIMPLE(NETSCAPE_PKEY, private_key, ASN1_OCTET_STRING)
/third_party/node/deps/openssl/openssl/crypto/ec/curve448/
H A Deddsa.c378 const uint8_t private_key[57], const uint8_t *context, in ossl_ed448_sign()
381 return ossl_c448_ed448_sign(ctx, out_sig, private_key, public_key, message, in ossl_ed448_sign()
398 const uint8_t public_key[57], const uint8_t private_key[57], in ossl_ed448ph_sign()
401 return ossl_c448_ed448_sign_prehash(ctx, out_sig, private_key, public_key, in ossl_ed448ph_sign()
419 const uint8_t private_key[57], const char *propq) in ossl_ed448_public_from_private()
421 return ossl_c448_ed448_derive_public_key(ctx, out_public_key, private_key, in ossl_ed448_public_from_private()
376 ossl_ed448_sign(OSSL_LIB_CTX *ctx, uint8_t *out_sig, const uint8_t *message, size_t message_len, const uint8_t public_key[57], const uint8_t private_key[57], const uint8_t *context, size_t context_len, const char *propq) ossl_ed448_sign() argument
397 ossl_ed448ph_sign(OSSL_LIB_CTX *ctx, uint8_t *out_sig, const uint8_t hash[64], const uint8_t public_key[57], const uint8_t private_key[57], const uint8_t *context, size_t context_len, const char *propq) ossl_ed448ph_sign() argument
418 ossl_ed448_public_from_private(OSSL_LIB_CTX *ctx, uint8_t out_public_key[57], const uint8_t private_key[57], const char *propq) ossl_ed448_public_from_private() argument
/third_party/openssl/crypto/ec/curve448/
H A Deddsa.c378 const uint8_t private_key[57], const uint8_t *context, in ossl_ed448_sign()
381 return ossl_c448_ed448_sign(ctx, out_sig, private_key, public_key, message, in ossl_ed448_sign()
398 const uint8_t public_key[57], const uint8_t private_key[57], in ossl_ed448ph_sign()
401 return ossl_c448_ed448_sign_prehash(ctx, out_sig, private_key, public_key, in ossl_ed448ph_sign()
419 const uint8_t private_key[57], const char *propq) in ossl_ed448_public_from_private()
421 return ossl_c448_ed448_derive_public_key(ctx, out_public_key, private_key, in ossl_ed448_public_from_private()
376 ossl_ed448_sign(OSSL_LIB_CTX *ctx, uint8_t *out_sig, const uint8_t *message, size_t message_len, const uint8_t public_key[57], const uint8_t private_key[57], const uint8_t *context, size_t context_len, const char *propq) ossl_ed448_sign() argument
397 ossl_ed448ph_sign(OSSL_LIB_CTX *ctx, uint8_t *out_sig, const uint8_t hash[64], const uint8_t public_key[57], const uint8_t private_key[57], const uint8_t *context, size_t context_len, const char *propq) ossl_ed448ph_sign() argument
418 ossl_ed448_public_from_private(OSSL_LIB_CTX *ctx, uint8_t out_public_key[57], const uint8_t private_key[57], const char *propq) ossl_ed448_public_from_private() argument
/third_party/node/test/fixtures/0-dns/
H A Dcreate-cert.js13 const private_key = fs.readFileSync('./0-dns-key.pem');
64 const signature = sign.sign(private_key);
/third_party/mbedtls/library/
H A Dlmots.c632 ctx->private_key[i_digit_idx], in mbedtls_lmots_generate_private_key()
662 (unsigned char *) priv_ctx->private_key, NULL, in mbedtls_lmots_calculate_public_key()
730 ret = hash_digit_array(&ctx->params, (unsigned char *) ctx->private_key, in mbedtls_lmots_sign()
754 mbedtls_platform_zeroize(ctx->private_key, in mbedtls_lmots_sign()
755 sizeof(ctx->private_key)); in mbedtls_lmots_sign()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/
H A Drsa.c18 int private_key; /* whether private key is set */ member
21 /* The following parameters are available only if private_key is set */
160 key->private_key = 1; in crypto_rsa_import_private_key()
272 if (use_private && !key->private_key) in crypto_rsa_exptmod()

Completed in 26 milliseconds

1234