/external/boringssl/src/crypto/curve25519/ |
ed25519_test.cc | 24 std::vector<uint8_t> private_key, public_key, message, expected_signature; local 25 if (!t->GetBytes(&private_key, "PRIV") || 26 private_key.size() != 64 || 37 private_key.data())) {
|
x25519_test.cc | 82 uint8_t out[32], private_key[32]; local 83 memset(private_key, 0x11, sizeof(private_key)); 85 if (X25519(out, private_key, kSmallOrderPoint)) {
|
/external/boringssl/src/tool/ |
generate_ed25519.cc | 61 uint8_t public_key[32], private_key[64]; local 62 ED25519_keypair(public_key, private_key); 65 WriteToFile(args_map["-out-private"], private_key, 66 sizeof(private_key));
|
speed.cc | 408 uint8_t public_key[32], private_key[64]; local 410 if (!TimeFunction(&results, [&public_key, &private_key]() -> bool { 411 ED25519_keypair(public_key, private_key); 422 if (!TimeFunction(&results, [&private_key, &signature]() -> bool { 424 private_key) == 1;
|
/external/libchrome/crypto/ |
nss_key_util_unittest.cc | 38 ScopedSECKEYPrivateKey private_key; local 41 &private_key)); 44 EXPECT_EQ(rsaKey, SECKEY_GetPrivateKeyType(private_key.get())); 46 PK11_GetPrivateModulusLen(private_key.get())); 53 ScopedSECKEYPrivateKey private_key; local 56 &private_key)); 65 EXPECT_EQ(private_key->pkcs11ID, private_key2->pkcs11ID); 71 ScopedSECKEYPrivateKey private_key; local 74 &private_key)); 81 PK11_DestroyTokenObject(private_key->pkcs11Slot, private_key->pkcs11ID) [all...] |
rsa_private_key_nss.cc | 62 ScopedSECKEYPrivateKey private_key; local 64 &public_key, &private_key)) { 70 rsa_key->key_ = private_key.release();
|
/system/keymaster/ |
nist_curve_key_exchange.h | 40 * NistCurveKeyExchange takes ownership of \p private_key. 42 NistCurveKeyExchange(EC_KEY* private_key, keymaster_error_t* error); 58 /* Caller takes ownership of \p private_key. */ 59 EC_KEY* private_key() { return private_key_.release(); } function in class:keymaster::NistCurveKeyExchange
|
nist_curve_key_exchange_test.cpp | 126 key_exchange->private_key(), nullptr /* kdf */)); 186 string private_key = hex2str(test.my_private_key); local 189 const uint8_t* private_key_data = reinterpret_cast<const uint8_t*>(private_key.data()); 191 d2i_ECPrivateKey(nullptr, &private_key_data, private_key.size()));
|
/system/webservd/webservd/ |
config.h | 48 brillo::SecureBlob private_key; member in struct:webservd::final::final
|
server.cc | 181 brillo::SecureBlob private_key = local 183 if (!cert || private_key.empty()) { 195 private_key = StoreRSAPrivateKey(rsa_key_pair.get()); 211 encryptor_->EncryptWithAuthentication(private_key.to_string(), 218 TLS_private_key_ = std::move(private_key); 225 handler_config.private_key = TLS_private_key_;
|
/external/vboot_reference/tests/ |
vboot_common2_tests.c | 44 const VbPrivateKey *private_key) 51 sig = CalculateSignature(test_data, test_size, private_key); 80 const VbPrivateKey *private_key) 87 sig = CalculateSignature(test_data, sizeof(test_data), private_key); 119 const VbPrivateKey *private_key) 131 0, 0, 0, 0, private_key); 150 ReSignKernelPreamble(h, private_key); 156 ReSignKernelPreamble(h, private_key); 162 ReSignKernelPreamble(h, private_key); 168 ReSignKernelPreamble(h, private_key); 217 VbPrivateKey *private_key = NULL; local [all...] |
vb20_common2_tests.c | 143 VbPrivateKey *private_key = NULL; local 150 private_key = PrivateKeyReadPem(filename, key_algorithm); 151 if (!private_key) { 152 fprintf(stderr, "Error reading private_key: %s\n", filename); 166 CalculateSignature(test_data, sizeof(test_data), private_key); 175 free(private_key);
|
/external/wpa_supplicant_8/src/tls/ |
rsa.c | 18 int private_key; /* whether private key is set */ member in struct:crypto_rsa_key 21 /* The following parameters are available only if private_key is set */ 160 key->private_key = 1; 272 if (use_private && !key->private_key)
|
/external/boringssl/src/ssl/ |
ssl_ecdh.c | 34 BIGNUM *private_key = (BIGNUM *)ctx->data; local 35 BN_clear_free(private_key); 40 BIGNUM *private_key = BN_new(); local 41 if (private_key == NULL) { 44 ctx->data = private_key; 63 if (!BN_rand_range(private_key, order)) { 66 } while (BN_is_zero(private_key)); 71 !EC_POINT_mul(group, public_key, private_key, NULL, NULL, bn_ctx)) { 99 BIGNUM *private_key = (BIGNUM *)ctx->data; local 100 assert(private_key != NULL) [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_config.h | 129 * private_key - File path to client private key file (PEM/DER/PFX) 138 * configuring private_key in one of the following formats: 144 * For example: private_key="hash://63093aa9c47f56ae88334c7b65a4" 153 u8 *private_key; member in struct:eap_peer_config 295 * This field is like private_key, but used for phase 2 (inside
|
/build/core/ |
package_internal.mk | 495 private_key := $(LOCAL_CERTIFICATE).pk8 macro 498 $(LOCAL_BUILT_MODULE): $(private_key) $(certificate) $(SIGNAPK_JAR) 499 $(LOCAL_BUILT_MODULE): PRIVATE_PRIVATE_KEY := $(private_key) 502 PACKAGES.$(LOCAL_PACKAGE_NAME).PRIVATE_KEY := $(private_key) 616 $(built_apk_splits): PRIVATE_PRIVATE_KEY := $(private_key)
|
/external/wpa_supplicant_8/src/crypto/ |
tls.h | 122 * @private_key: File or reference name for client private key in PEM or DER 124 * @private_key_blob: private_key as inlined data or %NULL if not used 168 const char *private_key; member in struct:tls_connection_params
|
tls_openssl.c | 196 EVP_PKEY *private_key; /* the private key if using engine */ member in struct:tls_connection 1083 conn->private_key = EVP_PKEY_from_keystore(key_id); 1084 if (!conn->private_key) { 1136 conn->private_key = ENGINE_load_private_key(conn->engine, 1139 if (!conn->private_key) { 1176 if (conn->private_key) { 1177 EVP_PKEY_free(conn->private_key); 1178 conn->private_key = NULL; 1192 if (conn->private_key) { 1193 EVP_PKEY_free(conn->private_key); [all...] |
/system/update_engine/payload_consumer/ |
delta_performer_integration_test.cc | 502 const string private_key = local 540 private_key, [all...] |
/external/boringssl/src/ssl/test/ |
bssl_shim.cc | 103 // private_key is the underlying private key used when testing custom keys. 104 ScopedEVP_PKEY private_key; member in struct:TestState 151 return EVP_PKEY_id(GetTestState(ssl)->private_key.get()); 155 return EVP_PKEY_size(GetTestState(ssl)->private_key.get()); 167 ScopedEVP_PKEY_CTX ctx(EVP_PKEY_CTX_new(test_state->private_key.get(), 230 RSA *rsa = EVP_PKEY_get0_RSA(test_state->private_key.get()); 321 test_state->private_key = LoadPrivateKey(config->key_file.c_str()); 322 if (!test_state->private_key) { [all...] |
/system/bt/stack/smp/ |
smp_keys.c | 999 memcpy(p_cb->private_key, p_cb->sc_oob_data.loc_oob_data.private_key_used, BT_OCTET32_LEN); 1073 BT_OCTET32 private_key; local 1107 BT_OCTET32 private_key; local [all...] |
smp_int.h | 293 BT_OCTET32 private_key; member in struct:__anon74003
|
/external/wpa_supplicant_8/wpa_supplicant/ |
config.h | 132 * private_key - File path to client private key file (PEM/DER/PFX) 141 * configuring private_key in one of the following formats: 147 * For example: private_key="hash://63093aa9c47f56ae88334c7b65a4" 156 char *private_key; member in struct:wpa_cred [all...] |
/external/wpa_supplicant_8/src/ap/ |
ap_config.h | 347 char *private_key; member in struct:hostapd_bss_config
|
/external/conscrypt/src/main/native/ |
org_conscrypt_NativeCrypto.cpp | 1592 jobject private_key = reinterpret_cast<jobject>(RSA_get_app_data(rsa)); local 1639 jobject private_key = reinterpret_cast<jobject>(RSA_get_app_data(rsa)); local 1726 jobject private_key = reinterpret_cast<jobject>(ptr); local 1781 jobject private_key = local 1863 jobject private_key; member in struct:__anon8490::KeyExData 2086 jobject private_key = EcKeyGetKey(ec_key); local [all...] |