/external/vboot_reference/tests/ |
H A D | vb20_common2_tests.c | 143 VbPrivateKey *private_key = NULL; local 150 private_key = PrivateKeyReadPem(filename, key_algorithm); 151 if (!private_key) { 152 fprintf(stderr, "Error reading private_key: %s\n", filename); 166 CalculateSignature(test_data, sizeof(test_data), private_key); 175 free(private_key);
|
H A D | vboot_common2_tests.c | 44 const VbPrivateKey *private_key) 51 sig = CalculateSignature(test_data, test_size, private_key); 80 const VbPrivateKey *private_key) 87 sig = CalculateSignature(test_data, sizeof(test_data), private_key); 119 const VbPrivateKey *private_key) 131 0, 0, 0, 0, private_key); 150 ReSignKernelPreamble(h, private_key); 156 ReSignKernelPreamble(h, private_key); 162 ReSignKernelPreamble(h, private_key); 168 ReSignKernelPreamble(h, private_key); 43 VerifyDataTest(const VbPublicKey *public_key, const VbPrivateKey *private_key) argument 79 VerifyDigestTest(const VbPublicKey *public_key, const VbPrivateKey *private_key) argument 118 VerifyKernelPreambleTest(const VbPublicKey *public_key, const VbPrivateKey *private_key) argument 217 VbPrivateKey *private_key = NULL; local [all...] |
H A D | vboot_common3_tests.c | 31 const VbPrivateKey *private_key, 38 hdr = KeyBlockCreate(data_key, private_key, 0x1234); 167 const VbPrivateKey *private_key, 180 private_key, 0x5678); 199 ReSignFirmwarePreamble(h, private_key); 205 ReSignFirmwarePreamble(h, private_key); 211 ReSignFirmwarePreamble(h, private_key); 217 ReSignFirmwarePreamble(h, private_key); 224 ReSignFirmwarePreamble(h, private_key); 230 ReSignFirmwarePreamble(h, private_key); 30 KeyBlockVerifyTest(const VbPublicKey *public_key, const VbPrivateKey *private_key, const VbPublicKey *data_key) argument 166 VerifyFirmwarePreambleTest(const VbPublicKey *public_key, const VbPrivateKey *private_key, const VbPublicKey *kernel_subkey) argument [all...] |
H A D | vb20_common3_tests.c | 33 const VbPrivateKey *private_key, 52 KeyBlockCreate(data_key, private_key, 0x1234); 80 resign_keyblock(h, private_key); 87 resign_keyblock(h, private_key); 94 resign_keyblock(h, private_key); 100 resign_keyblock(h, private_key); 107 resign_keyblock(h, private_key); 114 resign_keyblock(h, private_key); 136 resign_keyblock(h, private_key); 143 resign_keyblock(h, private_key); 32 test_verify_keyblock(const VbPublicKey *public_key, const VbPrivateKey *private_key, const VbPublicKey *data_key) argument 172 test_verify_fw_preamble(const VbPublicKey *public_key, const VbPrivateKey *private_key, const VbPublicKey *kernel_subkey) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | rsa.c | 18 int private_key; /* whether private key is set */ member in struct:crypto_rsa_key 21 /* The following parameters are available only if private_key is set */ 160 key->private_key = 1; 272 if (use_private && !key->private_key)
|
H A D | tlsv1_cred.c | 310 * @private_key: File or reference name for the key in PEM or DER format 313 * @private_key_blob: private_key as inlined data or %NULL if not used 318 const char *private_key, 331 if (private_key) { 336 buf = (u8 *) os_readfile(private_key, &len); 339 private_key); 317 tlsv1_set_private_key(struct tlsv1_credentials *cred, const char *private_key, const char *private_key_passwd, const u8 *private_key_blob, size_t private_key_blob_len) argument
|
/external/wpa_supplicant_8/src/tls/ |
H A D | rsa.c | 18 int private_key; /* whether private key is set */ member in struct:crypto_rsa_key 21 /* The following parameters are available only if private_key is set */ 160 key->private_key = 1; 272 if (use_private && !key->private_key)
|
H A D | tlsv1_cred.c | 310 * @private_key: File or reference name for the key in PEM or DER format 313 * @private_key_blob: private_key as inlined data or %NULL if not used 318 const char *private_key, 331 if (private_key) { 336 buf = (u8 *) os_readfile(private_key, &len); 339 private_key); 317 tlsv1_set_private_key(struct tlsv1_credentials *cred, const char *private_key, const char *private_key_passwd, const u8 *private_key_blob, size_t private_key_blob_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | rsa.c | 18 int private_key; /* whether private key is set */ member in struct:crypto_rsa_key 21 /* The following parameters are available only if private_key is set */ 160 key->private_key = 1; 272 if (use_private && !key->private_key)
|
H A D | tlsv1_cred.c | 310 * @private_key: File or reference name for the key in PEM or DER format 313 * @private_key_blob: private_key as inlined data or %NULL if not used 318 const char *private_key, 331 if (private_key) { 336 buf = (u8 *) os_readfile(private_key, &len); 339 private_key); 317 tlsv1_set_private_key(struct tlsv1_credentials *cred, const char *private_key, const char *private_key_passwd, const u8 *private_key_blob, size_t private_key_blob_len) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_config.h | 129 * private_key - File path to client private key file (PEM/DER/PFX) 138 * configuring private_key in one of the following formats: 144 * For example: private_key="hash://63093aa9c47f56ae88334c7b65a4" 153 u8 *private_key; member in struct:eap_peer_config 295 * This field is like private_key, but used for phase 2 (inside
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_config.h | 129 * private_key - File path to client private key file (PEM/DER/PFX) 138 * configuring private_key in one of the following formats: 144 * For example: private_key="hash://63093aa9c47f56ae88334c7b65a4" 153 u8 *private_key; member in struct:eap_peer_config 295 * This field is like private_key, but used for phase 2 (inside
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_config.h | 129 * private_key - File path to client private key file (PEM/DER/PFX) 138 * configuring private_key in one of the following formats: 144 * For example: private_key="hash://63093aa9c47f56ae88334c7b65a4" 153 u8 *private_key; member in struct:eap_peer_config 295 * This field is like private_key, but used for phase 2 (inside
|
/external/boringssl/src/ssl/ |
H A D | s3_lib.c | 321 int SSL_CTX_set1_tls_channel_id(SSL_CTX *ctx, EVP_PKEY *private_key) { argument 323 if (EVP_PKEY_id(private_key) != EVP_PKEY_EC || 324 EVP_PKEY_bits(private_key) != 256) { 330 ctx->tlsext_channel_id_private = EVP_PKEY_up_ref(private_key); 334 int SSL_set1_tls_channel_id(SSL *ssl, EVP_PKEY *private_key) { argument 336 if (EVP_PKEY_id(private_key) != EVP_PKEY_EC || 337 EVP_PKEY_bits(private_key) != 256) { 342 ssl->tlsext_channel_id_private = EVP_PKEY_up_ref(private_key);
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | tls.h | 118 * @private_key: File or reference name for client private key in PEM or DER 120 * @private_key_blob: private_key as inlined data or %NULL if not used 161 const char *private_key; member in struct:tls_connection_params
|
H A D | tls_openssl.c | 90 EVP_PKEY *private_key; /* the private key if using engine */ member in struct:tls_connection 909 conn->private_key = EVP_PKEY_from_keystore(key_id); 910 if (!conn->private_key) { 962 conn->private_key = ENGINE_load_private_key(conn->engine, 965 if (!conn->private_key) { 1002 if (conn->private_key) { 1003 EVP_PKEY_free(conn->private_key); 1004 conn->private_key = NULL; 1018 if (conn->private_key) { 1019 EVP_PKEY_free(conn->private_key); 2149 tls_read_pkcs12(SSL_CTX *ssl_ctx, SSL *ssl, const char *private_key, const char *passwd) argument 2335 tls_connection_private_key(void *_ssl_ctx, struct tls_connection *conn, const char *private_key, const char *private_key_passwd, const u8 *private_key_blob, size_t private_key_blob_len) argument 2460 tls_global_private_key(SSL_CTX *ssl_ctx, const char *private_key, const char *private_key_passwd) argument [all...] |
/external/wpa_supplicant_8/src/crypto/ |
H A D | tls.h | 118 * @private_key: File or reference name for client private key in PEM or DER 120 * @private_key_blob: private_key as inlined data or %NULL if not used 161 const char *private_key; member in struct:tls_connection_params
|
H A D | tls_openssl.c | 90 EVP_PKEY *private_key; /* the private key if using engine */ member in struct:tls_connection 909 conn->private_key = EVP_PKEY_from_keystore(key_id); 910 if (!conn->private_key) { 962 conn->private_key = ENGINE_load_private_key(conn->engine, 965 if (!conn->private_key) { 1002 if (conn->private_key) { 1003 EVP_PKEY_free(conn->private_key); 1004 conn->private_key = NULL; 1018 if (conn->private_key) { 1019 EVP_PKEY_free(conn->private_key); 2149 tls_read_pkcs12(SSL_CTX *ssl_ctx, SSL *ssl, const char *private_key, const char *passwd) argument 2335 tls_connection_private_key(void *_ssl_ctx, struct tls_connection *conn, const char *private_key, const char *private_key_passwd, const u8 *private_key_blob, size_t private_key_blob_len) argument 2460 tls_global_private_key(SSL_CTX *ssl_ctx, const char *private_key, const char *private_key_passwd) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | tls.h | 118 * @private_key: File or reference name for client private key in PEM or DER 120 * @private_key_blob: private_key as inlined data or %NULL if not used 161 const char *private_key; member in struct:tls_connection_params
|
H A D | tls_openssl.c | 90 EVP_PKEY *private_key; /* the private key if using engine */ member in struct:tls_connection 909 conn->private_key = EVP_PKEY_from_keystore(key_id); 910 if (!conn->private_key) { 962 conn->private_key = ENGINE_load_private_key(conn->engine, 965 if (!conn->private_key) { 1002 if (conn->private_key) { 1003 EVP_PKEY_free(conn->private_key); 1004 conn->private_key = NULL; 1018 if (conn->private_key) { 1019 EVP_PKEY_free(conn->private_key); 2149 tls_read_pkcs12(SSL_CTX *ssl_ctx, SSL *ssl, const char *private_key, const char *passwd) argument 2335 tls_connection_private_key(void *_ssl_ctx, struct tls_connection *conn, const char *private_key, const char *private_key_passwd, const u8 *private_key_blob, size_t private_key_blob_len) argument 2460 tls_global_private_key(SSL_CTX *ssl_ctx, const char *private_key, const char *private_key_passwd) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | config.h | 125 * private_key - File path to client private key file (PEM/DER/PFX) 134 * configuring private_key in one of the following formats: 140 * For example: private_key="hash://63093aa9c47f56ae88334c7b65a4" 149 char *private_key; member in struct:wpa_cred
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | ap_config.h | 329 char *private_key; member in struct:hostapd_bss_config
|
/external/wpa_supplicant_8/src/ap/ |
H A D | ap_config.h | 329 char *private_key; member in struct:hostapd_bss_config
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | ap_config.h | 329 char *private_key; member in struct:hostapd_bss_config
|
/external/conscrypt/src/main/native/ |
H A D | org_conscrypt_NativeCrypto.cpp | 1588 jobject private_key = reinterpret_cast<jobject>(RSA_get_app_data(rsa)); local 1589 if (!private_key) { 1603 env, rawSignDigestWithPrivateKey(env, private_key, 1635 jobject private_key = reinterpret_cast<jobject>(RSA_get_app_data(rsa)); local 1636 if (!private_key) { 1648 ScopedLocalRef<jbyteArray> cleartext(env, rsaDecryptWithPrivateKey(env, private_key, 1722 jobject private_key = reinterpret_cast<jobject>(ptr); local 1723 if (private_key == NULL) return; 1727 env->DeleteGlobalRef(private_key); 1777 jobject private_key local 1859 jobject private_key; member in struct:__anon2940::KeyExData 2082 jobject private_key = EcKeyGetKey(ec_key); local [all...] |