/external/libchrome/crypto/ |
nss_key_util_unittest.cc | 38 ScopedSECKEYPrivateKey private_key; local 41 &private_key)); 44 EXPECT_EQ(rsaKey, SECKEY_GetPrivateKeyType(private_key.get())); 46 PK11_GetPrivateModulusLen(private_key.get())); 52 ScopedSECKEYPrivateKey private_key; local 55 &private_key)); 64 EXPECT_EQ(private_key->pkcs11ID, private_key2->pkcs11ID); 70 ScopedSECKEYPrivateKey private_key; local 73 &private_key)); 80 PK11_DestroyTokenObject(private_key->pkcs11Slot, private_key->pkcs11ID) [all...] |
nss_key_util.cc | 63 ScopedSECKEYPrivateKey* private_key) { 70 private_key->reset(PK11_GenerateKeyPair(slot, CKM_RSA_PKCS_KEY_PAIR_GEN, 73 if (!*private_key)
|
rsa_private_key_nss.cc | 62 ScopedSECKEYPrivateKey private_key; local 64 &public_key, &private_key)) { 70 rsa_key->key_ = private_key.release();
|
/external/wpa_supplicant_8/wpa_supplicant/examples/ |
wpa2-eap-ccmp.conf | 13 private_key="/etc/cert/user.p12"
|
/system/keymaster/ |
kem.h | 46 // Decrypt takes ownership of \p private_key. 47 virtual bool Decrypt(EC_KEY* private_key, const Buffer& encrypted_key, Buffer* output_key) = 0; 48 virtual bool Decrypt(EC_KEY* private_key, const uint8_t* encrypted_key,
|
ecies_kem.h | 47 bool Decrypt(EC_KEY* private_key, const Buffer& encrypted_key, Buffer* output_key) override; 48 bool Decrypt(EC_KEY* private_key, const uint8_t* encrypted_key, size_t encrypted_key_len,
|
nist_curve_key_exchange.h | 40 * NistCurveKeyExchange takes ownership of \p private_key. 42 NistCurveKeyExchange(EC_KEY* private_key, keymaster_error_t* error); 58 /* Caller takes ownership of \p private_key. */ 59 EC_KEY* private_key() { return private_key_.release(); } function in class:keymaster::NistCurveKeyExchange
|
ecies_kem.cpp | 129 bool EciesKem::Decrypt(EC_KEY* private_key, const Buffer& encrypted_key, Buffer* output_key) { 130 return Decrypt(private_key, encrypted_key.peek_read(), encrypted_key.available_read(), 135 bool EciesKem::Decrypt(EC_KEY* private_key, const uint8_t* encrypted_key, size_t encrypted_key_len, 139 key_exchange_.reset(new NistCurveKeyExchange(private_key, &error));
|
nist_curve_key_exchange_test.cpp | 126 key_exchange->private_key(), nullptr /* kdf */)); 186 string private_key = hex2str(test.my_private_key); local 189 const uint8_t* private_key_data = reinterpret_cast<const uint8_t*>(private_key.data()); 191 d2i_ECPrivateKey(nullptr, &private_key_data, private_key.size()));
|
/external/vboot_reference/tests/ |
vboot_common2_tests.c | 44 const VbPrivateKey *private_key) 51 sig = CalculateSignature(test_data, test_size, private_key); 80 const VbPrivateKey *private_key) 87 sig = CalculateSignature(test_data, sizeof(test_data), private_key); 119 const VbPrivateKey *private_key) 131 0, 0, 0, 0, private_key); 150 ReSignKernelPreamble(h, private_key); 156 ReSignKernelPreamble(h, private_key); 162 ReSignKernelPreamble(h, private_key); 168 ReSignKernelPreamble(h, private_key); 217 VbPrivateKey *private_key = NULL; local [all...] |
vb20_common3_tests.c | 33 const VbPrivateKey *private_key, 52 KeyBlockCreate(data_key, private_key, 0x1234); 80 resign_keyblock(h, private_key); 87 resign_keyblock(h, private_key); 94 resign_keyblock(h, private_key); 100 resign_keyblock(h, private_key); 107 resign_keyblock(h, private_key); 114 resign_keyblock(h, private_key); 136 resign_keyblock(h, private_key); 143 resign_keyblock(h, private_key); [all...] |
vboot_common3_tests.c | 31 const VbPrivateKey *private_key, 38 hdr = KeyBlockCreate(data_key, private_key, 0x1234); 167 const VbPrivateKey *private_key, 180 private_key, 0x5678); 199 ReSignFirmwarePreamble(h, private_key); 205 ReSignFirmwarePreamble(h, private_key); 211 ReSignFirmwarePreamble(h, private_key); 217 ReSignFirmwarePreamble(h, private_key); 224 ReSignFirmwarePreamble(h, private_key); 230 ReSignFirmwarePreamble(h, private_key); [all...] |
vb20_common2_tests.c | 143 VbPrivateKey *private_key = NULL; local 150 private_key = PrivateKeyReadPem(filename, key_algorithm); 151 if (!private_key) { 152 fprintf(stderr, "Error reading private_key: %s\n", filename); 166 CalculateSignature(test_data, sizeof(test_data), private_key); 175 free(private_key);
|
/external/boringssl/src/crypto/curve25519/ |
ed25519_test.cc | 25 std::vector<uint8_t> private_key, public_key, message, expected_signature; local 26 if (!t->GetBytes(&private_key, "PRIV") || 27 private_key.size() != 64 || 38 private_key.data())) {
|
/external/boringssl/src/tool/ |
generate_ed25519.cc | 68 uint8_t public_key[32], private_key[64]; local 69 ED25519_keypair(public_key, private_key); 72 WriteToFile(args_map["-out-private"], private_key, 73 sizeof(private_key));
|
/external/boringssl/src/include/openssl/ |
curve25519.h | 52 const uint8_t private_key[32], 58 const uint8_t private_key[32]); 76 * |message| using |private_key|. It returns one on success or zero on 80 const uint8_t private_key[64]);
|
/external/libchrome/crypto/third_party/nss/ |
chromium-nss.h | 69 SECKEYPrivateKey** private_key,
|
/external/v8/tools/testrunner/server/ |
signatures.py | 40 private_key = "~/.ssh/v8_dtest" 42 (signature_file, private_key, filename),
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_cred.h | 41 const char *private_key,
|
/external/strace/tests/ |
ipc_sem.c | 60 static const key_t private_key = local 85 id = semget(private_key, 1, 0600);
|
/external/strace/tests-m32/ |
ipc_sem.c | 60 static const key_t private_key = local 85 id = semget(private_key, 1, 0600);
|
/external/strace/tests-mx32/ |
ipc_sem.c | 60 static const key_t private_key = local 85 id = semget(private_key, 1, 0600);
|
/external/boringssl/src/ssl/ |
ssl_ecdh.c | 35 BIGNUM *private_key = (BIGNUM *)ctx->data; local 36 BN_clear_free(private_key); 41 BIGNUM *private_key = BN_new(); local 42 if (private_key == NULL) { 45 ctx->data = private_key; 62 if (!BN_rand_range_ex(private_key, 1, EC_GROUP_get0_order(group))) { 69 !EC_POINT_mul(group, public_key, private_key, NULL, NULL, bn_ctx) || 88 BIGNUM *private_key = (BIGNUM *)ctx->data; local 89 assert(private_key != NULL); 107 /* Compute the x-coordinate of |peer_key| * |private_key|. * [all...] |
/external/boringssl/src/crypto/evp/ |
p_rsa_asn1.c | 123 CBB pkcs8, algorithm, oid, null, private_key; local 130 !CBB_add_asn1(&pkcs8, &private_key, CBS_ASN1_OCTETSTRING) || 131 !RSA_marshal_private_key(&private_key, key->pkey.rsa) ||
|
/build/make/core/ |
dpi_specific_apk.mk | 29 $(built_dpi_apk): PRIVATE_PRIVATE_KEY := $(private_key) 51 $(built_dpi_apk) : $(private_key) $(certificate) $(SIGNAPK_JAR) 78 PACKAGES.$(dpi_apk_name).PRIVATE_KEY := $(private_key)
|