/external/libchrome/crypto/ |
H A D | nss_key_util_unittest.cc | 38 ScopedSECKEYPrivateKey private_key; local 41 &private_key)); 44 EXPECT_EQ(rsaKey, SECKEY_GetPrivateKeyType(private_key.get())); 46 PK11_GetPrivateModulusLen(private_key.get())); 52 ScopedSECKEYPrivateKey private_key; local 55 &private_key)); 64 EXPECT_EQ(private_key->pkcs11ID, private_key2->pkcs11ID); 70 ScopedSECKEYPrivateKey private_key; local 73 &private_key)); 80 PK11_DestroyTokenObject(private_key [all...] |
H A D | nss_key_util.cc | 63 ScopedSECKEYPrivateKey* private_key) { 70 private_key->reset(PK11_GenerateKeyPair(slot, CKM_RSA_PKCS_KEY_PAIR_GEN, 73 if (!*private_key) 59 GenerateRSAKeyPairNSS(PK11SlotInfo* slot, uint16_t num_bits, bool permanent, ScopedSECKEYPublicKey* public_key, ScopedSECKEYPrivateKey* private_key) argument
|
H A D | rsa_private_key_nss.cc | 62 ScopedSECKEYPrivateKey private_key; local 64 &public_key, &private_key)) { 70 rsa_key->key_ = private_key.release();
|
/external/boringssl/src/crypto/curve25519/ |
H A D | x25519_test.cc | 78 uint8_t out[32], private_key[32]; local 79 OPENSSL_memset(private_key, 0x11, sizeof(private_key)); 82 EXPECT_FALSE(X25519(out, private_key, kSmallOrderPoint))
|
/external/boringssl/src/tool/ |
H A D | generate_ed25519.cc | 68 uint8_t public_key[32], private_key[64]; local 69 ED25519_keypair(public_key, private_key); 72 WriteToFile(args_map["-out-private"], private_key, 73 sizeof(private_key));
|
/external/strace/tests/ |
H A D | ipc_msg.c | 68 static const key_t private_key = local 90 id = msgget(private_key, 0600);
|
H A D | ipc_shm.c | 51 static const key_t private_key = local 81 id = shmget(private_key, 1, 0600);
|
H A D | ipc_sem.c | 61 static const key_t private_key = local 86 id = semget(private_key, 1, 0600);
|
/external/strace/tests-m32/ |
H A D | ipc_msg.c | 68 static const key_t private_key = local 90 id = msgget(private_key, 0600);
|
H A D | ipc_shm.c | 51 static const key_t private_key = local 81 id = shmget(private_key, 1, 0600);
|
H A D | ipc_sem.c | 61 static const key_t private_key = local 86 id = semget(private_key, 1, 0600);
|
/external/strace/tests-mx32/ |
H A D | ipc_msg.c | 68 static const key_t private_key = local 90 id = msgget(private_key, 0600);
|
H A D | ipc_shm.c | 51 static const key_t private_key = local 81 id = shmget(private_key, 1, 0600);
|
H A D | ipc_sem.c | 61 static const key_t private_key = local 86 id = semget(private_key, 1, 0600);
|
/external/boringssl/src/crypto/evp/ |
H A D | p_rsa_asn1.c | 138 CBB pkcs8, algorithm, oid, null, private_key; local 145 !CBB_add_asn1(&pkcs8, &private_key, CBS_ASN1_OCTETSTRING) || 146 !RSA_marshal_private_key(&private_key, key->pkey.rsa) ||
|
H A D | p_dsa_asn1.c | 177 CBB pkcs8, algorithm, oid, private_key; local 184 !CBB_add_asn1(&pkcs8, &private_key, CBS_ASN1_OCTETSTRING) || 185 !BN_marshal_asn1(&private_key, dsa->priv_key) ||
|
H A D | p_ec_asn1.c | 174 CBB pkcs8, algorithm, oid, private_key; local 181 !CBB_add_asn1(&pkcs8, &private_key, CBS_ASN1_OCTETSTRING) || 182 !EC_KEY_marshal_private_key(&private_key, ec_key, enc_flags) ||
|
H A D | p_ed25519_asn1.c | 131 CBB pkcs8, algorithm, oid, private_key, inner; local 137 !CBB_add_asn1(&pkcs8, &private_key, CBS_ASN1_OCTETSTRING) || 138 !CBB_add_asn1(&private_key, &inner, CBS_ASN1_OCTETSTRING) || 184 EVP_PKEY *EVP_PKEY_new_ed25519_private(const uint8_t private_key[64]) { argument 188 !set_privkey(ret, private_key)) {
|
/external/boringssl/src/ssl/ |
H A D | ssl_ecdh.cc | 35 BIGNUM *private_key = (BIGNUM *)ctx->data; local 36 BN_clear_free(private_key); 49 bssl::UniquePtr<BIGNUM> private_key(BN_new()); 50 if (!group || !private_key || 51 !BN_rand_range_ex(private_key.get(), 1, 59 !EC_POINT_mul(group.get(), public_key.get(), private_key.get(), NULL, 67 ctx->data = private_key.release(); 74 BIGNUM *private_key = (BIGNUM *)ctx->data; local 75 assert(private_key != NULL); 103 /* Compute the x-coordinate of |peer_key| * |private_key| [all...] |
/external/vboot_reference/tests/ |
H A D | vb20_common2_tests.c | 143 VbPrivateKey *private_key = NULL; local 150 private_key = PrivateKeyReadPem(filename, key_algorithm); 151 if (!private_key) { 152 fprintf(stderr, "Error reading private_key: %s\n", filename); 166 CalculateSignature(test_data, sizeof(test_data), private_key); 175 free(private_key);
|
H A D | vboot_common2_tests.c | 44 const VbPrivateKey *private_key) 51 sig = CalculateSignature(test_data, test_size, private_key); 80 const VbPrivateKey *private_key) 87 sig = CalculateSignature(test_data, sizeof(test_data), private_key); 119 const VbPrivateKey *private_key) 131 0, 0, 0, 0, private_key); 150 ReSignKernelPreamble(h, private_key); 156 ReSignKernelPreamble(h, private_key); 162 ReSignKernelPreamble(h, private_key); 168 ReSignKernelPreamble(h, private_key); 43 VerifyDataTest(const VbPublicKey *public_key, const VbPrivateKey *private_key) argument 79 VerifyDigestTest(const VbPublicKey *public_key, const VbPrivateKey *private_key) argument 118 VerifyKernelPreambleTest(const VbPublicKey *public_key, const VbPrivateKey *private_key) argument 217 VbPrivateKey *private_key = NULL; local [all...] |
H A D | vboot_common3_tests.c | 31 const VbPrivateKey *private_key, 38 hdr = KeyBlockCreate(data_key, private_key, 0x1234); 167 const VbPrivateKey *private_key, 180 private_key, 0x5678); 199 ReSignFirmwarePreamble(h, private_key); 205 ReSignFirmwarePreamble(h, private_key); 211 ReSignFirmwarePreamble(h, private_key); 217 ReSignFirmwarePreamble(h, private_key); 224 ReSignFirmwarePreamble(h, private_key); 230 ReSignFirmwarePreamble(h, private_key); 30 KeyBlockVerifyTest(const VbPublicKey *public_key, const VbPrivateKey *private_key, const VbPublicKey *data_key) argument 166 VerifyFirmwarePreambleTest(const VbPublicKey *public_key, const VbPrivateKey *private_key, const VbPublicKey *kernel_subkey) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | rsa.c | 18 int private_key; /* whether private key is set */ member in struct:crypto_rsa_key 21 /* The following parameters are available only if private_key is set */ 160 key->private_key = 1; 272 if (use_private && !key->private_key)
|
/external/wpa_supplicant_8/src/tls/ |
H A D | rsa.c | 18 int private_key; /* whether private key is set */ member in struct:crypto_rsa_key 21 /* The following parameters are available only if private_key is set */ 160 key->private_key = 1; 272 if (use_private && !key->private_key)
|
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | rsa.c | 18 int private_key; /* whether private key is set */ member in struct:crypto_rsa_key 21 /* The following parameters are available only if private_key is set */ 160 key->private_key = 1; 272 if (use_private && !key->private_key)
|