HomeSort by relevance Sort by last modified time
    Searched refs:private_key (Results 1 - 25 of 62) sorted by null

1 2 3

  /external/dropbear/libtomcrypt/src/pk/ecc/
ecc_shared_secret.c 28 @param private_key The private ECC key
34 int ecc_shared_secret(ecc_key *private_key, ecc_key *public_key,
42 LTC_ARGCHK(private_key != NULL);
48 if (private_key->type != PK_PRIVATE) {
52 if (ltc_ecc_is_valid_idx(private_key->idx) == 0 || ltc_ecc_is_valid_idx(public_key->idx) == 0) {
56 if (XSTRCMP(private_key->dp->name, public_key->dp->name) != 0) {
71 if ((err = mp_read_radix(prime, (char *)private_key->dp->prime, 16)) != CRYPT_OK) { goto done; }
72 if ((err = ltc_mp.ecc_ptmul(private_key->k, &public_key->pubkey, result, prime, 1)) != CRYPT_OK) { goto done; }
  /external/wpa_supplicant_6/wpa_supplicant/examples/
wpa2-eap-ccmp.conf 13 private_key="/etc/cert/user.p12"
  /external/wpa_supplicant_8/wpa_supplicant/examples/
wpa2-eap-ccmp.conf 13 private_key="/etc/cert/user.p12"
  /external/dropbear/libtomcrypt/src/pk/dsa/
dsa_shared_secret.c 22 @param private_key The private DSA key (the exponent)
29 int dsa_shared_secret(void *private_key, void *base,
37 LTC_ARGCHK(private_key != NULL);
47 if ((err = mp_exptmod(base, private_key, public_key->p, res)) != CRYPT_OK) {
  /external/chromium/chrome/browser/extensions/
extension_creator.h 60 crypto::RSAPrivateKey* private_key,
65 crypto::RSAPrivateKey* private_key,
extension_creator.cc 46 // Validate input |private_key| (if provided).
125 std::string private_key; local
126 if (!Extension::ProducePEM(private_key_bytes, &private_key)) {
132 if (!Extension::FormatPEMForFileOutput(private_key, &pem_output,
166 crypto::RSAPrivateKey* private_key,
169 crypto::SignatureCreator::Create(private_key));
189 crypto::RSAPrivateKey* private_key,
197 if (!private_key->ExportPublicKey(&public_key)) {
  /external/chromium/net/base/
keygen_handler_mac.cc 99 SecKeyRef private_key,
107 SecKeyRef private_key = NULL; local
129 &public_key, &private_key);
171 err = SignData(encoded, private_key, &signature);
203 if (private_key)
204 SecKeychainItemDelete(reinterpret_cast<SecKeychainItemRef>(private_key));
215 if (private_key)
216 CFRelease(private_key);
307 SecKeyRef private_key,
310 OSStatus err = CreateSignatureContext(private_key,
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/tls/
tlsv1_cred.h 39 const char *private_key,
tlsv1_cred.c 227 * @private_key: File or reference name for the key in PEM or DER format
230 * @private_key_blob: private_key as inlined data or %NULL if not used
235 const char *private_key,
247 if (private_key) {
252 buf = (u8 *) os_readfile(private_key, &len);
255 private_key);
rsa.c 25 int private_key; /* whether private key is set */ member in struct:crypto_rsa_key
28 /* The following parameters are available only if private_key is set */
145 key->private_key = 1;
258 if (use_private && !key->private_key)
  /external/wpa_supplicant_8/src/tls/
tlsv1_cred.h 33 const char *private_key,
rsa.c 18 int private_key; /* whether private key is set */ member in struct:crypto_rsa_key
21 /* The following parameters are available only if private_key is set */
137 key->private_key = 1;
249 if (use_private && !key->private_key)
tlsv1_cred.c 310 * @private_key: File or reference name for the key in PEM or DER format
313 * @private_key_blob: private_key as inlined data or %NULL if not used
318 const char *private_key,
331 if (private_key) {
336 buf = (u8 *) os_readfile(private_key, &len);
339 private_key);
  /external/openssl/crypto/asn1/
n_pkey.c 76 ASN1_OCTET_STRING *private_key; member in struct:netscape_pkey_st
102 ASN1_SIMPLE(NETSCAPE_PKEY, private_key, ASN1_OCTET_STRING)
150 pkey->private_key->length=rsalen;
178 pkey->private_key->data = zz;
197 OPENSSL_cleanse(pkey->private_key->data, rsalen);
333 zz=pkey->private_key->data;
334 if ((ret=d2i_RSAPrivateKey(a,&zz,pkey->private_key->length)) == NULL)
  /external/wpa_supplicant_6/wpa_supplicant/
wpa_supplicant.conf.orig 391 # private_key: File path to client private key file (PEM/DER/PFX)
397 # configuring private_key in one of the following formats:
400 # for example: private_key="hash://63093aa9c47f56ae88334c7b65a4"
561 private_key="/etc/cert/user.prv"
675 private_key="/etc/cert/user.prv"
781 private_key="/etc/cert/user.prv"
  /external/wpa_supplicant_8/wpa_supplicant/
wpa_supplicant.conf 323 # private_key: File path to client private key file (PEM/DER/PFX)
331 # configuring private_key in one of the following formats:
337 # For example: private_key="hash://63093aa9c47f56ae88334c7b65a4"
633 # private_key: File path to client private key file (PEM/DER/PFX)
639 # configuring private_key in one of the following formats:
642 # for example: private_key="hash://63093aa9c47f56ae88334c7b65a4"
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/crypto/
tls_openssl.c 73 EVP_PKEY *private_key; /* the private key if using engine */ member in struct:tls_connection
793 conn->private_key = ENGINE_load_private_key(conn->engine,
795 if (!conn->private_key) {
825 if (conn->private_key) {
826 EVP_PKEY_free(conn->private_key);
827 conn->private_key = NULL;
841 if (conn->private_key) {
842 EVP_PKEY_free(conn->private_key);
843 conn->private_key = NULL;
    [all...]
tls_gnutls.c 611 if (params->client_cert && params->private_key) {
614 conn->xcred, params->client_cert, params->private_key,
621 params->private_key, GNUTLS_X509_FMT_DER);
629 } else if (params->private_key) {
635 conn->xcred, params->private_key, GNUTLS_X509_FMT_DER,
638 wpa_printf(MSG_DEBUG, "Failed to load private_key in "
743 if (params->client_cert && params->private_key) {
747 params->private_key, GNUTLS_X509_FMT_PEM);
753 params->private_key, GNUTLS_X509_FMT_DER);
761 } else if (params->private_key) {
    [all...]
  /external/webkit/Tools/Scripts/
new-run-webkit-websocketserver 54 option_parser.add_option('-k', '--private_key', dest='private_key',
87 if options.private_key:
88 kwds['private_key'] = options.private_key
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_config.h 123 * private_key - File path to client private key file (PEM/DER/PFX)
132 * configuring private_key in one of the following formats:
138 * For example: private_key="hash://63093aa9c47f56ae88334c7b65a4"
147 u8 *private_key; member in struct:eap_peer_config
252 * This field is like private_key, but used for phase 2 (inside
  /external/wpa_supplicant_8/src/eap_peer/
eap_config.h 129 * private_key - File path to client private key file (PEM/DER/PFX)
138 * configuring private_key in one of the following formats:
144 * For example: private_key="hash://63093aa9c47f56ae88334c7b65a4"
153 u8 *private_key; member in struct:eap_peer_config
258 * This field is like private_key, but used for phase 2 (inside
  /external/openssl/android.testssl/
CAss.cnf 45 private_key = $dir/private/cakey.pem# The private key
  /external/wpa_supplicant_8/src/crypto/
tls_openssl.c 69 EVP_PKEY *private_key; /* the private key if using engine */ member in struct:tls_connection
848 conn->private_key = ENGINE_load_private_key(conn->engine,
850 if (!conn->private_key) {
880 if (conn->private_key) {
881 EVP_PKEY_free(conn->private_key);
882 conn->private_key = NULL;
896 if (conn->private_key) {
897 EVP_PKEY_free(conn->private_key);
898 conn->private_key = NULL;
    [all...]
tls_gnutls.c 567 if (params->client_cert && params->private_key) {
570 conn->xcred, params->client_cert, params->private_key,
577 params->private_key, GNUTLS_X509_FMT_DER);
585 } else if (params->private_key) {
591 conn->xcred, params->private_key, GNUTLS_X509_FMT_DER,
594 wpa_printf(MSG_DEBUG, "Failed to load private_key in "
678 if (params->client_cert && params->private_key) {
682 params->private_key, GNUTLS_X509_FMT_PEM);
688 params->private_key, GNUTLS_X509_FMT_DER);
696 } else if (params->private_key) {
    [all...]
  /build/core/
package.mk 369 private_key := $(LOCAL_CERTIFICATE).pk8 macro
372 $(LOCAL_BUILT_MODULE): $(private_key) $(certificate) $(SIGNAPK_JAR)
373 $(LOCAL_BUILT_MODULE): PRIVATE_PRIVATE_KEY := $(private_key)
376 PACKAGES.$(LOCAL_PACKAGE_NAME).PRIVATE_KEY := $(private_key)

Completed in 707 milliseconds

1 2 3