/third_party/node/deps/openssl/openssl/crypto/ec/ |
H A D | ecx_backend.c | 32 ossl_x25519_public_from_private(key->pubkey, key->privkey); in ossl_ecx_public_from_private() 36 key->privkey, key->propq)) { in ossl_ecx_public_from_private() 42 ossl_x448_public_from_private(key->pubkey, key->privkey); in ossl_ecx_public_from_private() 46 key->privkey, key->propq)) { in ossl_ecx_public_from_private() 75 (void **)&ecx->privkey, ecx->keylen, in ossl_ecx_key_fromdata() 84 OPENSSL_secure_clear_free(ecx->privkey, privkeylen); in ossl_ecx_key_fromdata() 85 ecx->privkey = NULL; in ossl_ecx_key_fromdata() 143 && key->privkey != NULL) { in ossl_ecx_key_dup() 146 memcpy(ret->privkey, key->privkey, re in ossl_ecx_key_dup() 164 unsigned char *privkey, *pubkey; ossl_ecx_key_op() local [all...] |
H A D | ecx_meth.c | 107 if (ecxkey == NULL || ecxkey->privkey == NULL) { in ecx_priv_encode() 112 oct.data = ecxkey->privkey; in ecx_priv_encode() 175 if (ecxkey == NULL || ecxkey->privkey == NULL) { in ecx_key_print() 184 if (ASN1_buf_print(bp, ecxkey->privkey, KEYLEN(pkey), in ecx_key_print() 309 || key->privkey == NULL in ecx_get_priv_key() 314 memcpy(priv, key->privkey, *len); in ecx_get_priv_key() 367 if (key->privkey != NULL) { in ecx_pkey_export_to() 370 key->privkey, key->keylen)) in ecx_pkey_export_to() 726 const unsigned char **privkey, in validate_ecx_derive() 737 if (ecxkey == NULL || ecxkey->privkey in validate_ecx_derive() 724 validate_ecx_derive(EVP_PKEY_CTX *ctx, unsigned char *key, size_t *keylen, const unsigned char **privkey, const unsigned char **pubkey) validate_ecx_derive() argument 754 const unsigned char *privkey, *pubkey; pkey_ecx_derive25519() local 767 const unsigned char *privkey, *pubkey; pkey_ecx_derive448() local 945 unsigned char *privkey = NULL, *pubkey; s390x_pkey_ecx_keygen25519() local 988 unsigned char *privkey = NULL, *pubkey; s390x_pkey_ecx_keygen448() local 1034 unsigned char *privkey = NULL, *pubkey; s390x_pkey_ecd_keygen25519() local 1100 unsigned char *privkey = NULL, *pubkey; s390x_pkey_ecd_keygen448() local 1161 const unsigned char *privkey, *pubkey; s390x_pkey_ecx_derive25519() local 1174 const unsigned char *privkey, *pubkey; s390x_pkey_ecx_derive448() local [all...] |
H A D | ecx_key.c | 71 OPENSSL_secure_clear_free(key->privkey, key->keylen); in ossl_ecx_key_free() 95 key->privkey = OPENSSL_secure_zalloc(key->keylen); in ossl_ecx_key_allocate_privkey() 97 return key->privkey; in ossl_ecx_key_allocate_privkey()
|
/third_party/openssl/crypto/ec/ |
H A D | ecx_backend.c | 32 ossl_x25519_public_from_private(key->pubkey, key->privkey); in ossl_ecx_public_from_private() 36 key->privkey, key->propq)) { in ossl_ecx_public_from_private() 42 ossl_x448_public_from_private(key->pubkey, key->privkey); in ossl_ecx_public_from_private() 46 key->privkey, key->propq)) { in ossl_ecx_public_from_private() 75 (void **)&ecx->privkey, ecx->keylen, in ossl_ecx_key_fromdata() 84 OPENSSL_secure_clear_free(ecx->privkey, privkeylen); in ossl_ecx_key_fromdata() 85 ecx->privkey = NULL; in ossl_ecx_key_fromdata() 140 && key->privkey != NULL) { in ossl_ecx_key_dup() 143 memcpy(ret->privkey, key->privkey, re in ossl_ecx_key_dup() 161 unsigned char *privkey, *pubkey; ossl_ecx_key_op() local [all...] |
H A D | ecx_meth.c | 107 if (ecxkey == NULL || ecxkey->privkey == NULL) { in ecx_priv_encode() 112 oct.data = ecxkey->privkey; in ecx_priv_encode() 175 if (ecxkey == NULL || ecxkey->privkey == NULL) { in ecx_key_print() 184 if (ASN1_buf_print(bp, ecxkey->privkey, KEYLEN(pkey), in ecx_key_print() 309 || key->privkey == NULL in ecx_get_priv_key() 314 memcpy(priv, key->privkey, *len); in ecx_get_priv_key() 367 if (key->privkey != NULL) { in ecx_pkey_export_to() 370 key->privkey, key->keylen)) in ecx_pkey_export_to() 726 const unsigned char **privkey, in validate_ecx_derive() 737 if (ecxkey == NULL || ecxkey->privkey in validate_ecx_derive() 724 validate_ecx_derive(EVP_PKEY_CTX *ctx, unsigned char *key, size_t *keylen, const unsigned char **privkey, const unsigned char **pubkey) validate_ecx_derive() argument 754 const unsigned char *privkey, *pubkey; pkey_ecx_derive25519() local 767 const unsigned char *privkey, *pubkey; pkey_ecx_derive448() local 945 unsigned char *privkey = NULL, *pubkey; s390x_pkey_ecx_keygen25519() local 988 unsigned char *privkey = NULL, *pubkey; s390x_pkey_ecx_keygen448() local 1034 unsigned char *privkey = NULL, *pubkey; s390x_pkey_ecd_keygen25519() local 1100 unsigned char *privkey = NULL, *pubkey; s390x_pkey_ecd_keygen448() local 1161 const unsigned char *privkey, *pubkey; s390x_pkey_ecx_derive25519() local 1174 const unsigned char *privkey, *pubkey; s390x_pkey_ecx_derive448() local [all...] |
H A D | ecx_key.c | 71 OPENSSL_secure_clear_free(key->privkey, key->keylen); in ossl_ecx_key_free() 95 key->privkey = OPENSSL_secure_zalloc(key->keylen); in ossl_ecx_key_allocate_privkey() 97 return key->privkey; in ossl_ecx_key_allocate_privkey()
|
/third_party/node/deps/openssl/openssl/providers/implementations/keymgmt/ |
H A D | ecx_kmgmt.c | 138 ok = ok && key->privkey != NULL; in ecx_has() 173 const unsigned char *pa = key1->privkey; in ecx_match() 174 const unsigned char *pb = key2->privkey; in ecx_match() 221 && key->privkey != NULL in key_to_params() 224 key->privkey, key->keylen)) in key_to_params() 411 OPENSSL_clear_free(ecxkey->privkey, ecxkey->keylen); in ecx_set_params() 412 ecxkey->privkey = NULL; in ecx_set_params() 582 unsigned char *privkey; in ecx_gen() local 596 if ((privkey = ossl_ecx_key_allocate_privkey(key)) == NULL) { in ecx_gen() 600 if (RAND_priv_bytes_ex(gctx->libctx, privkey, ke in ecx_gen() 840 unsigned char *privkey = NULL, *pubkey; s390x_ecx_keygen25519() local 886 unsigned char *privkey = NULL, *pubkey; s390x_ecx_keygen448() local 935 unsigned char *privkey = NULL, *pubkey; s390x_ecd_keygen25519() local 1003 unsigned char *privkey = NULL, *pubkey; s390x_ecd_keygen448() local [all...] |
/third_party/openssl/providers/implementations/keymgmt/ |
H A D | ecx_kmgmt.c | 138 ok = ok && key->privkey != NULL; in ecx_has() 173 const unsigned char *pa = key1->privkey; in ecx_match() 174 const unsigned char *pb = key2->privkey; in ecx_match() 221 && key->privkey != NULL in key_to_params() 224 key->privkey, key->keylen)) in key_to_params() 408 OPENSSL_clear_free(ecxkey->privkey, ecxkey->keylen); in ecx_set_params() 409 ecxkey->privkey = NULL; in ecx_set_params() 579 unsigned char *privkey; in ecx_gen() local 593 if ((privkey = ossl_ecx_key_allocate_privkey(key)) == NULL) { in ecx_gen() 597 if (RAND_priv_bytes_ex(gctx->libctx, privkey, ke in ecx_gen() 837 unsigned char *privkey = NULL, *pubkey; s390x_ecx_keygen25519() local 883 unsigned char *privkey = NULL, *pubkey; s390x_ecx_keygen448() local 932 unsigned char *privkey = NULL, *pubkey; s390x_ecd_keygen25519() local 1000 unsigned char *privkey = NULL, *pubkey; s390x_ecd_keygen448() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | crypto_internal-modexp.c | 16 int crypto_dh_init(u8 generator, const u8 *prime, size_t prime_len, u8 *privkey, in crypto_dh_init() argument 21 if (os_get_random(privkey, prime_len) < 0) in crypto_dh_init() 23 if (os_memcmp(privkey, prime, prime_len) > 0) { in crypto_dh_init() 25 privkey[0] = 0; in crypto_dh_init() 29 if (crypto_mod_exp(&generator, 1, privkey, prime_len, prime, prime_len, in crypto_dh_init() 44 const u8 *privkey, size_t privkey_len, in crypto_dh_derive_secret() 81 res = crypto_mod_exp(pubkey, pubkey_len, privkey, privkey_len, in crypto_dh_derive_secret() 42 crypto_dh_derive_secret(u8 generator, const u8 *prime, size_t prime_len, const u8 *order, size_t order_len, const u8 *privkey, size_t privkey_len, const u8 *pubkey, size_t pubkey_len, u8 *secret, size_t *len) crypto_dh_derive_secret() argument
|
H A D | crypto_gnutls.c | 286 int crypto_dh_init(u8 generator, const u8 *prime, size_t prime_len, u8 *privkey, in crypto_dh_init() argument 291 if (os_get_random(privkey, prime_len) < 0) in crypto_dh_init() 293 if (os_memcmp(privkey, prime, prime_len) > 0) { in crypto_dh_init() 295 privkey[0] = 0; in crypto_dh_init() 299 if (crypto_mod_exp(&generator, 1, privkey, prime_len, prime, prime_len, in crypto_dh_init() 314 const u8 *privkey, size_t privkey_len, in crypto_dh_derive_secret() 353 res = crypto_mod_exp(pubkey, pubkey_len, privkey, privkey_len, in crypto_dh_derive_secret() 312 crypto_dh_derive_secret(u8 generator, const u8 *prime, size_t prime_len, const u8 *order, size_t order_len, const u8 *privkey, size_t privkey_len, const u8 *pubkey, size_t pubkey_len, u8 *secret, size_t *len) crypto_dh_derive_secret() argument
|
H A D | crypto_nettle.c | 307 int crypto_dh_init(u8 generator, const u8 *prime, size_t prime_len, u8 *privkey, in crypto_dh_init() argument 312 if (os_get_random(privkey, prime_len) < 0) in crypto_dh_init() 314 if (os_memcmp(privkey, prime, prime_len) > 0) { in crypto_dh_init() 316 privkey[0] = 0; in crypto_dh_init() 320 if (crypto_mod_exp(&generator, 1, privkey, prime_len, prime, prime_len, in crypto_dh_init() 335 const u8 *privkey, size_t privkey_len, in crypto_dh_derive_secret() 367 res = crypto_mod_exp(pubkey, pubkey_len, privkey, privkey_len, in crypto_dh_derive_secret() 333 crypto_dh_derive_secret(u8 generator, const u8 *prime, size_t prime_len, const u8 *order, size_t order_len, const u8 *privkey, size_t privkey_len, const u8 *pubkey, size_t pubkey_len, u8 *secret, size_t *len) crypto_dh_derive_secret() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | crypto_internal-modexp.c | 16 int crypto_dh_init(u8 generator, const u8 *prime, size_t prime_len, u8 *privkey, in crypto_dh_init() argument 21 if (os_get_random(privkey, prime_len) < 0) in crypto_dh_init() 23 if (os_memcmp(privkey, prime, prime_len) > 0) { in crypto_dh_init() 25 privkey[0] = 0; in crypto_dh_init() 29 if (crypto_mod_exp(&generator, 1, privkey, prime_len, prime, prime_len, in crypto_dh_init() 44 const u8 *privkey, size_t privkey_len, in crypto_dh_derive_secret() 81 res = crypto_mod_exp(pubkey, pubkey_len, privkey, privkey_len, in crypto_dh_derive_secret() 42 crypto_dh_derive_secret(u8 generator, const u8 *prime, size_t prime_len, const u8 *order, size_t order_len, const u8 *privkey, size_t privkey_len, const u8 *pubkey, size_t pubkey_len, u8 *secret, size_t *len) crypto_dh_derive_secret() argument
|
H A D | crypto_gnutls.c | 286 int crypto_dh_init(u8 generator, const u8 *prime, size_t prime_len, u8 *privkey, in crypto_dh_init() argument 291 if (os_get_random(privkey, prime_len) < 0) in crypto_dh_init() 293 if (os_memcmp(privkey, prime, prime_len) > 0) { in crypto_dh_init() 295 privkey[0] = 0; in crypto_dh_init() 299 if (crypto_mod_exp(&generator, 1, privkey, prime_len, prime, prime_len, in crypto_dh_init() 314 const u8 *privkey, size_t privkey_len, in crypto_dh_derive_secret() 353 res = crypto_mod_exp(pubkey, pubkey_len, privkey, privkey_len, in crypto_dh_derive_secret() 312 crypto_dh_derive_secret(u8 generator, const u8 *prime, size_t prime_len, const u8 *order, size_t order_len, const u8 *privkey, size_t privkey_len, const u8 *pubkey, size_t pubkey_len, u8 *secret, size_t *len) crypto_dh_derive_secret() argument
|
H A D | crypto_nettle.c | 307 int crypto_dh_init(u8 generator, const u8 *prime, size_t prime_len, u8 *privkey, in crypto_dh_init() argument 312 if (os_get_random(privkey, prime_len) < 0) in crypto_dh_init() 314 if (os_memcmp(privkey, prime, prime_len) > 0) { in crypto_dh_init() 316 privkey[0] = 0; in crypto_dh_init() 320 if (crypto_mod_exp(&generator, 1, privkey, prime_len, prime, prime_len, in crypto_dh_init() 335 const u8 *privkey, size_t privkey_len, in crypto_dh_derive_secret() 367 res = crypto_mod_exp(pubkey, pubkey_len, privkey, privkey_len, in crypto_dh_derive_secret() 333 crypto_dh_derive_secret(u8 generator, const u8 *prime, size_t prime_len, const u8 *order, size_t order_len, const u8 *privkey, size_t privkey_len, const u8 *pubkey, size_t pubkey_len, u8 *secret, size_t *len) crypto_dh_derive_secret() argument
|
/third_party/openssl/test/ |
H A D | tls-provider.c | 44 unsigned char privkey[XOR_KEY_SIZE]; member 282 secret[i] = pxorctx->key->privkey[i] ^ pxorctx->peerkey->pubkey[i]; in xor_derive() 339 * 3. we derive using our ephemeral privkey in combination with the peer in xor_encapsulate() 501 memcpy(tokey->privkey, fromkey->privkey, XOR_KEY_SIZE); in xor_dup() 645 if (RAND_bytes_ex(gctx->libctx, key->privkey, XOR_KEY_SIZE, 0) <= 0) { in xor_gen() 650 key->pubkey[i] = key->privkey[i] ^ private_constant[i]; in xor_gen() 664 unsigned char privkey[XOR_KEY_SIZE]; in xor_import() local 666 void *pprivkey = privkey, *ppubkey = pubkey; in xor_import() 673 memset(privkey, in xor_import() [all...] |
H A D | fatalerrtest.c | 17 static char *privkey = NULL; variable 33 &sctx, &cctx, cert, privkey))) in test_fatalerr() 95 || !TEST_ptr(privkey = test_get_argument(1))) in setup_tests()
|
H A D | dtlstest.c | 20 static char *privkey = NULL; variable 83 &sctx, &cctx, cert, privkey))) in test_dtls_unprocessed() 205 &sctx, &cctx, cert, privkey))) in test_dtls_drop_records() 318 &sctx, &cctx, cert, privkey))) in test_cookie() 358 &sctx, &cctx, cert, privkey))) in test_dtls_duplicate_records() 425 &sctx, NULL, cert, privkey))) in test_just_finished() 484 &sctx, &cctx, cert, privkey))) in test_swap_records() 593 || !TEST_ptr(privkey = test_get_argument(1))) in setup_tests()
|
H A D | recordlentest.c | 16 static char *privkey = NULL; variable 107 &sctx, &cctx, cert, privkey))) in test_record_overflow() 194 || !TEST_ptr(privkey = test_get_argument(1))) in setup_tests()
|
/third_party/node/deps/openssl/openssl/providers/implementations/exchange/ |
H A D | ecx_exch.c | 125 || ecxctx->key->privkey == NULL in ecx_derive() 151 ecxctx->key->privkey) == 0) { in ecx_derive() 157 if (ossl_x25519(secret, ecxctx->key->privkey, in ecx_derive() 167 ecxctx->key->privkey) == 0) { in ecx_derive() 173 if (ossl_x448(secret, ecxctx->key->privkey, in ecx_derive()
|
/third_party/node/deps/openssl/openssl/crypto/dsa/ |
H A D | dsa_backend.c | 132 ASN1_INTEGER *privkey = NULL; in ossl_dsa_key_from_pkcs8() local 143 if ((privkey = d2i_ASN1_INTEGER(NULL, &p, pklen)) == NULL) in ossl_dsa_key_from_pkcs8() 145 if (privkey->type == V_ASN1_NEG_INTEGER || ptype != V_ASN1_SEQUENCE) in ossl_dsa_key_from_pkcs8() 155 || !ASN1_INTEGER_to_BN(privkey, dsa_privkey)) { in ossl_dsa_key_from_pkcs8() 192 ASN1_STRING_clear_free(privkey); in ossl_dsa_key_from_pkcs8()
|
/third_party/openssl/crypto/dsa/ |
H A D | dsa_backend.c | 132 ASN1_INTEGER *privkey = NULL; in ossl_dsa_key_from_pkcs8() local 143 if ((privkey = d2i_ASN1_INTEGER(NULL, &p, pklen)) == NULL) in ossl_dsa_key_from_pkcs8() 145 if (privkey->type == V_ASN1_NEG_INTEGER || ptype != V_ASN1_SEQUENCE) in ossl_dsa_key_from_pkcs8() 155 || !ASN1_INTEGER_to_BN(privkey, dsa_privkey)) { in ossl_dsa_key_from_pkcs8() 192 ASN1_STRING_clear_free(privkey); in ossl_dsa_key_from_pkcs8()
|
/third_party/openssl/providers/implementations/exchange/ |
H A D | ecx_exch.c | 125 || ecxctx->key->privkey == NULL in ecx_derive() 151 ecxctx->key->privkey) == 0) { in ecx_derive() 157 if (ossl_x25519(secret, ecxctx->key->privkey, in ecx_derive() 167 ecxctx->key->privkey) == 0) { in ecx_derive() 173 if (ossl_x448(secret, ecxctx->key->privkey, in ecx_derive()
|
/third_party/lwip/src/include/lwip/ |
H A D | altcp_tls.h | 72 const u8_t *privkey, size_t privkey_len, 81 struct altcp_tls_config *altcp_tls_create_config_server_privkey_cert(const u8_t *privkey, size_t privkey_len, 93 struct altcp_tls_config *altcp_tls_create_config_client_2wayauth(const u8_t *ca, size_t ca_len, const u8_t *privkey, size_t privkey_len,
|
/third_party/node/deps/openssl/openssl/crypto/ec/curve448/ |
H A D | ed448.h | 38 * privkey (in): The private key. 44 const uint8_t privkey [EDDSA_448_PRIVATE_BYTES], 51 * privkey (in): The private key. 67 const uint8_t privkey[EDDSA_448_PRIVATE_BYTES], 78 * privkey (in): The private key. 93 const uint8_t privkey[EDDSA_448_PRIVATE_BYTES],
|
/third_party/openssl/crypto/ec/curve448/ |
H A D | ed448.h | 38 * privkey (in): The private key. 44 const uint8_t privkey [EDDSA_448_PRIVATE_BYTES], 51 * privkey (in): The private key. 67 const uint8_t privkey[EDDSA_448_PRIVATE_BYTES], 78 * privkey (in): The private key. 93 const uint8_t privkey[EDDSA_448_PRIVATE_BYTES],
|