| /src/crypto/external/bsd/openssl.old/dist/crypto/ec/curve448/ |
| curve448_local.h | 13 int X448(uint8_t out_shared_key[56], const uint8_t private_key[56], 17 const uint8_t private_key[56]); 20 const uint8_t public_key[57], const uint8_t private_key[57], 28 const uint8_t public_key[57], const uint8_t private_key[57], 36 const uint8_t private_key[57]);
|
| eddsa.c | 339 const uint8_t public_key[57], const uint8_t private_key[57], 342 return c448_ed448_sign(out_sig, private_key, public_key, message, 356 const uint8_t public_key[57], const uint8_t private_key[57], 359 return c448_ed448_sign_prehash(out_sig, private_key, public_key, hash, 373 const uint8_t private_key[57]) 375 return c448_ed448_derive_public_key(out_public_key, private_key)
|
| /src/external/bsd/wpa/dist/wpa_supplicant/examples/ |
| wpa2-eap-ccmp.conf | 13 private_key="/etc/cert/user.p12"
|
| /src/crypto/external/bsd/heimdal/dist/lib/hx509/ |
| collector.c | 38 struct private_key { struct 40 hx509_private_key private_key; member in struct:private_key 49 struct private_key **data; 106 free_private_key(struct private_key *key) 109 if (key->private_key) 110 hx509_private_key_free(&key->private_key); 119 hx509_private_key private_key, 123 struct private_key *key; 145 if (private_key) { 146 key->private_key = private_key [all...] |
| crypto-ec.c | 250 sig->length = ECDSA_size(signer->private_key.ecdsa); 262 sig->data, &siglen, signer->private_key.ecdsa); 300 group = EC_KEY_get0_group(signer->private_key.ecdsa); 328 hx509_private_key private_key, 350 hx509_private_key private_key) 387 private_key->private_key.ecdsa = d2i_ECPrivateKey(pkey, &p, len); 388 if (private_key->private_key.ecdsa == NULL) { 393 private_key->signature_alg = ASN1_OID_ID_ECDSA_WITH_SHA256 [all...] |
| crypto.c | 371 sig->length = RSA_size(signer->private_key.rsa); 381 signer->private_key.rsa, 407 hx509_private_key private_key) 413 private_key->private_key.rsa = 415 if (private_key->private_key.rsa == NULL) { 420 private_key->signature_alg = ASN1_OID_ID_PKCS1_SHA1WITHRSAENCRYPTION; 433 hx509_private_key private_key, 440 len = i2d_RSAPublicKey(private_key->private_key.rsa, NULL) [all...] |
| /src/crypto/external/bsd/openssl/dist/crypto/ec/curve448/ |
| curve448_local.h | 15 const uint8_t public_key[57], const uint8_t private_key[57],
|
| eddsa.c | 378 const uint8_t private_key[57], const uint8_t *context, 381 return ossl_c448_ed448_sign(ctx, out_sig, private_key, public_key, message, 398 const uint8_t public_key[57], const uint8_t private_key[57], 401 return ossl_c448_ed448_sign_prehash(ctx, out_sig, private_key, public_key, 419 const uint8_t private_key[57], const char *propq) 421 return ossl_c448_ed448_derive_public_key(ctx, out_public_key, private_key,
|
| /src/crypto/external/apache2/openssl/dist/include/crypto/ |
| ecx.h | 88 int ossl_x25519(uint8_t out_shared_key[32], const uint8_t private_key[32], 91 const uint8_t private_key[32]); 94 const uint8_t private_key[32], 97 const uint8_t public_key[32], const uint8_t private_key[32], 108 const uint8_t private_key[57], const char *propq); 111 const uint8_t public_key[57], const uint8_t private_key[57], 123 int ossl_x448(uint8_t out_shared_key[56], const uint8_t private_key[56], 126 const uint8_t private_key[56]);
|
| /src/crypto/external/bsd/openssl/dist/include/crypto/ |
| ecx.h | 87 int ossl_x25519(uint8_t out_shared_key[32], const uint8_t private_key[32], 90 const uint8_t private_key[32]); 94 const uint8_t private_key[32], 98 const uint8_t public_key[32], const uint8_t private_key[32], 107 const uint8_t private_key[57], const char *propq); 111 const uint8_t private_key[57], const uint8_t *context, 120 ossl_x448(uint8_t out_shared_key[56], const uint8_t private_key[56], 124 const uint8_t private_key[56]);
|
| /src/crypto/external/cpl/trousers/dist/src/tspi/daa/ |
| daa_debug.h | 8 DAA_PRIVATE_KEY_internal *private_key; member in struct:tdKEY_PAIR_WITH_PROOF_internal 39 const DAA_PRIVATE_KEY_internal *private_key
|
| daa_structs.c | 271 DAA_PRIVATE_KEY_internal *private_key = local 274 private_key->p_prime = bi_new_ptr(); bi_set( private_key->p_prime, pPrime); 275 private_key->q_prime = bi_new_ptr(); bi_set( private_key->q_prime, qPrime); 276 private_key->productPQprime = bi_new_ptr(); 277 bi_mul( private_key->productPQprime, pPrime, qPrime); 278 return private_key; 283 save_DAA_PRIVATE_KEY(FILE *file, const DAA_PRIVATE_KEY_internal *private_key) 285 BI_SAVE( private_key->p_prime , file) [all...] |
| /src/crypto/external/bsd/openssl.old/dist/crypto/asn1/ |
| n_pkey.c | 28 ASN1_OCTET_STRING *private_key; 53 ASN1_SIMPLE(NETSCAPE_PKEY, private_key, ASN1_OCTET_STRING)
|
| /src/crypto/external/bsd/openssl.old/dist/test/recipes/90-test_store_data/ |
| ca.cnf | 29 private_key = ./demoCA/private/cakey.pem 33 private_key = cakey.pem
|
| /src/crypto/external/apache2/openssl/dist/crypto/asn1/ |
| n_pkey.c | 28 ASN1_OCTET_STRING *private_key; member in struct:netscape_pkey_st 52 ASN1_SIMPLE(NETSCAPE_PKEY, private_key, ASN1_OCTET_STRING)
|
| /src/crypto/external/bsd/openssl/dist/crypto/asn1/ |
| n_pkey.c | 28 ASN1_OCTET_STRING *private_key; member in struct:netscape_pkey_st 53 ASN1_SIMPLE(NETSCAPE_PKEY, private_key, ASN1_OCTET_STRING)
|
| /src/crypto/external/cpl/trousers/dist/src/tspi/daa/daa_issuer/ |
| issuer_setup.c | 60 TSS_DAA_PRIVATE_KEY *private_key; local 128 private_key = key_pair->private_key; 129 private_key_internal = e_2_i_TSS_DAA_PRIVATE_KEY( private_key); 137 key_pair_with_proof->private_key = private_key_internal;
|
| /src/usr.bin/nbsvtool/ |
| nbsvtool.c | 65 * `private_key' must be given. An additional hint to the verifier how 71 sign_file(X509 *cert, EVP_PKEY *private_key, STACK_OF(X509) *cert_chain, 86 p7 = PKCS7_sign(cert, private_key, cert_chain, in, 234 EVP_PKEY *private_key; member in struct:__anon8302 271 crypto_state.private_key = 274 if (crypto_state.private_key == NULL) 278 crypto_state.private_key); 375 crypto_state.private_key,
|
| /src/external/bsd/pkg_install/dist/lib/ |
| pkcs7.c | 237 EVP_PKEY *private_key; 247 private_key = NULL; 280 private_key = PEM_read_PrivateKey(f, NULL, ssl_pass_cb, NULL); 282 if (private_key == NULL) { 287 if (X509_check_private_key(certificate, private_key) != 1) { 295 p7 = PKCS7_sign(certificate, private_key, cert_chain, in, 316 EVP_PKEY_free(private_key);
|
| /src/external/bsd/wpa/dist/src/tls/ |
| tlsv1_cred.h | 41 const char *private_key,
|
| /src/crypto/external/apache2/openssl/dist/test/ |
| ml_kem_internal_test.c | 105 ML_KEM_KEY *private_key = NULL; local 124 private_key = ossl_ml_kem_key_new(NULL, NULL, alg[i]); 125 if (private_key == NULL || public_key == NULL 137 private_key)) 190 ciphertext, v->ctext_bytes, private_key)) 203 private_key))) 218 private_key))) 234 ossl_ml_kem_key_free(private_key);
|
| /src/external/bsd/wpa/dist/wpa_supplicant/ |
| wpa_supplicant.conf | 174 # private_key option appear to be a PKCS#11 URI, and these options 647 # For example: private_key="pkcs11:manufacturer=piv_II;id=%01" 652 # private_key: File path to client private key file (PEM/DER/PFX) 660 # For example: private_key="pkcs11:manufacturer=piv_II;id=%01" 663 # configuring private_key in one of the following formats: 669 # For example: private_key="hash://63093aa9c47f56ae88334c7b65a4" 1284 # private_key: File path to client private key file (PEM/DER/PFX) 1290 # configuring private_key in one of the following formats: 1293 # for example: private_key="hash://63093aa9c47f56ae88334c7b65a4" 1384 # (private_key/client_cert) is no used and TLS session resumption wa [all...] |
| /src/external/bsd/wpa/dist/src/eap_peer/ |
| eap_config.h | 73 * private_key - File path to client private key file (PEM/DER/PFX) 82 * configuring private_key in one of the following formats: 88 * For example: private_key="hash://63093aa9c47f56ae88334c7b65a4" 97 char *private_key; member in struct:eap_peer_cert_config 478 * (private_key/client_cert) is no used and TLS session resumption was
|
| /src/crypto/external/bsd/openssl.old/dist/test/ |
| CAss.cnf | 45 private_key = $dir/private/cakey.pem# The private key
|
| test.cnf | 24 private_key = $dir/private/CAkey.pem# The private key
|