/external/boringssl/src/tool/ |
generate_ed25519.cc | 60 uint8_t public_key[32], private_key[64]; local 61 ED25519_keypair(public_key, private_key); 64 WriteToFile(args_map["-out-private"], private_key, 65 sizeof(private_key));
|
speed.cc | 485 uint8_t public_key[32], private_key[64]; local 487 if (!TimeFunction(&results, [&public_key, &private_key]() -> bool { 488 ED25519_keypair(public_key, private_key); 499 if (!TimeFunction(&results, [&private_key, &signature]() -> bool { 501 private_key) == 1;
|
/external/libchrome/crypto/ |
nss_key_util_unittest.cc | 38 ScopedSECKEYPrivateKey private_key; local 41 &private_key)); 44 EXPECT_EQ(rsaKey, SECKEY_GetPrivateKeyType(private_key.get())); 46 PK11_GetPrivateModulusLen(private_key.get())); 52 ScopedSECKEYPrivateKey private_key; local 55 &private_key)); 64 EXPECT_EQ(private_key->pkcs11ID, private_key2->pkcs11ID); 70 ScopedSECKEYPrivateKey private_key; local 73 &private_key)); 80 PK11_DestroyTokenObject(private_key->pkcs11Slot, private_key->pkcs11ID) [all...] |
/system/keymaster/include/keymaster/km_openssl/ |
nist_curve_key_exchange.h | 40 * NistCurveKeyExchange takes ownership of \p private_key. 42 NistCurveKeyExchange(EC_KEY* private_key, keymaster_error_t* error); 58 /* Caller takes ownership of \p private_key. */ 59 EC_KEY* private_key() { return private_key_.release(); } function in class:keymaster::NistCurveKeyExchange
|
/external/boringssl/src/crypto/curve25519/ |
x25519_test.cc | 78 uint8_t out[32], private_key[32]; local 79 OPENSSL_memset(private_key, 0x11, sizeof(private_key)); 82 EXPECT_FALSE(X25519(out, private_key, kSmallOrderPoint))
|
/external/strace/tests/ |
ipc_msg.c | 68 static const key_t private_key = local 90 id = msgget(private_key, 0600);
|
ipc_shm.c | 60 static const key_t private_key = local 126 id = shmget(private_key, 1, 0600);
|
ipc_sem.c | 61 static const key_t private_key = local 86 id = semget(private_key, 1, 0600);
|
/external/strace/tests-m32/ |
ipc_msg.c | 68 static const key_t private_key = local 90 id = msgget(private_key, 0600);
|
ipc_shm.c | 60 static const key_t private_key = local 126 id = shmget(private_key, 1, 0600);
|
ipc_sem.c | 61 static const key_t private_key = local 86 id = semget(private_key, 1, 0600);
|
/external/strace/tests-mx32/ |
ipc_msg.c | 68 static const key_t private_key = local 90 id = msgget(private_key, 0600);
|
ipc_shm.c | 60 static const key_t private_key = local 126 id = shmget(private_key, 1, 0600);
|
ipc_sem.c | 61 static const key_t private_key = local 86 id = semget(private_key, 1, 0600);
|
/external/boringssl/src/crypto/evp/ |
p_rsa_asn1.c | 117 CBB pkcs8, algorithm, oid, null, private_key; local 124 !CBB_add_asn1(&pkcs8, &private_key, CBS_ASN1_OCTETSTRING) || 125 !RSA_marshal_private_key(&private_key, key->pkey.rsa) ||
|
p_dsa_asn1.c | 177 CBB pkcs8, algorithm, oid, private_key; local 184 !CBB_add_asn1(&pkcs8, &private_key, CBS_ASN1_OCTETSTRING) || 185 !BN_marshal_asn1(&private_key, dsa->priv_key) ||
|
p_ed25519_asn1.c | 127 CBB pkcs8, algorithm, oid, private_key, inner; local 133 !CBB_add_asn1(&pkcs8, &private_key, CBS_ASN1_OCTETSTRING) || 134 !CBB_add_asn1(&private_key, &inner, CBS_ASN1_OCTETSTRING) || 180 EVP_PKEY *EVP_PKEY_new_ed25519_private(const uint8_t private_key[64]) { 184 !set_privkey(ret, private_key)) {
|
p_ec_asn1.c | 174 CBB pkcs8, algorithm, oid, private_key; local 181 !CBB_add_asn1(&pkcs8, &private_key, CBS_ASN1_OCTETSTRING) || 182 !EC_KEY_marshal_private_key(&private_key, ec_key, enc_flags) ||
|
/external/vboot_reference/tests/ |
vboot_common2_tests.c | 44 const VbPrivateKey *private_key) 51 sig = CalculateSignature(test_data, test_size, private_key); 80 const VbPrivateKey *private_key) 87 sig = CalculateSignature(test_data, sizeof(test_data), private_key); 119 const VbPrivateKey *private_key) 131 0, 0, 0, 0, private_key); 150 ReSignKernelPreamble(h, private_key); 156 ReSignKernelPreamble(h, private_key); 162 ReSignKernelPreamble(h, private_key); 168 ReSignKernelPreamble(h, private_key); 217 VbPrivateKey *private_key = NULL; local [all...] |
vb20_common2_tests.c | 143 VbPrivateKey *private_key = NULL; local 150 private_key = PrivateKeyReadPem(filename, key_algorithm); 151 if (!private_key) { 152 fprintf(stderr, "Error reading private_key: %s\n", filename); 166 CalculateSignature(test_data, sizeof(test_data), private_key); 175 free(private_key);
|
/external/wpa_supplicant_8/src/tls/ |
rsa.c | 18 int private_key; /* whether private key is set */ member in struct:crypto_rsa_key 21 /* The following parameters are available only if private_key is set */ 160 key->private_key = 1; 272 if (use_private && !key->private_key)
|
/external/boringssl/src/third_party/fiat/ |
internal.h | 136 uint8_t private_key[32]; member in struct:spake2_ctx_st
|
/system/core/trusty/keymaster/ |
trusty_keymaster_main.cpp | 179 keymaster_blob_t private_key = {rsa_privkey_pk8_der, rsa_privkey_pk8_der_len}; local 180 int error = device->import_key(&rsa_param_set, KM_KEY_FORMAT_PKCS8, &private_key, &key, nullptr); 283 keymaster_blob_t private_key = {ec_privkey_pk8_der, ec_privkey_pk8_der_len}; local 284 int error = device->import_key(&ec_param_set, KM_KEY_FORMAT_PKCS8, &private_key, &key, nullptr);
|
/system/keymaster/tests/ |
nist_curve_key_exchange_test.cpp | 126 key_exchange->private_key(), nullptr /* kdf */)); 186 string private_key = hex2str(test.my_private_key); local 189 const uint8_t* private_key_data = reinterpret_cast<const uint8_t*>(private_key.data()); 191 d2i_ECPrivateKey(nullptr, &private_key_data, private_key.size()));
|
/external/boringssl/src/crypto/ec_extra/ |
ec_asn1.c | 76 CBS ec_private_key, private_key; local 81 !CBS_get_asn1(&ec_private_key, &private_key, CBS_ASN1_OCTETSTRING)) { 130 BN_bin2bn(CBS_data(&private_key), CBS_len(&private_key), NULL); 200 CBB ec_private_key, private_key; local 203 !CBB_add_asn1(&ec_private_key, &private_key, CBS_ASN1_OCTETSTRING) || 204 !BN_bn2cbb_padded(&private_key,
|