/netbsd-current/crypto/external/bsd/openssl.old/dist/crypto/ec/curve448/ |
H A D | curve448_local.h | 13 int X448(uint8_t out_shared_key[56], const uint8_t private_key[56], 17 const uint8_t private_key[56]); 20 const uint8_t public_key[57], const uint8_t private_key[57], 28 const uint8_t public_key[57], const uint8_t private_key[57], 36 const uint8_t private_key[57]);
|
H A D | eddsa.c | 339 const uint8_t public_key[57], const uint8_t private_key[57], 342 return c448_ed448_sign(out_sig, private_key, public_key, message, 356 const uint8_t public_key[57], const uint8_t private_key[57], 359 return c448_ed448_sign_prehash(out_sig, private_key, public_key, hash, 373 const uint8_t private_key[57]) 375 return c448_ed448_derive_public_key(out_public_key, private_key) 338 ED448_sign(uint8_t *out_sig, const uint8_t *message, size_t message_len, const uint8_t public_key[57], const uint8_t private_key[57], const uint8_t *context, size_t context_len) argument 355 ED448ph_sign(uint8_t *out_sig, const uint8_t hash[64], const uint8_t public_key[57], const uint8_t private_key[57], const uint8_t *context, size_t context_len) argument 372 ED448_public_from_private(uint8_t out_public_key[57], const uint8_t private_key[57]) argument
|
/netbsd-current/external/bsd/wpa/dist/wpa_supplicant/examples/ |
H A D | wpa2-eap-ccmp.conf | 13 private_key="/etc/cert/user.p12"
|
/netbsd-current/crypto/external/bsd/heimdal/dist/lib/hx509/ |
H A D | collector.c | 38 struct private_key { struct 40 hx509_private_key private_key; member in struct:private_key 49 struct private_key **data; 106 free_private_key(struct private_key *key) 109 if (key->private_key) 110 hx509_private_key_free(&key->private_key); 119 hx509_private_key private_key, 123 struct private_key *key; 145 if (private_key) { 146 key->private_key 116 _hx509_collector_private_key_add(hx509_context context, struct hx509_collector *c, const AlgorithmIdentifier *alg, hx509_private_key private_key, const heim_octet_string *key_data, const heim_octet_string *localKeyId) argument [all...] |
H A D | crypto-ec.c | 250 sig->length = ECDSA_size(signer->private_key.ecdsa); 262 sig->data, &siglen, signer->private_key.ecdsa); 300 group = EC_KEY_get0_group(signer->private_key.ecdsa); 328 hx509_private_key private_key, 350 hx509_private_key private_key) 387 private_key->private_key.ecdsa = d2i_ECPrivateKey(pkey, &p, len); 388 if (private_key->private_key.ecdsa == NULL) { 393 private_key 327 ecdsa_private_key2SPKI(hx509_context context, hx509_private_key private_key, SubjectPublicKeyInfo *spki) argument 345 ecdsa_private_key_import(hx509_context context, const AlgorithmIdentifier *keyai, const void *data, size_t len, hx509_key_format_t format, hx509_private_key private_key) argument 404 ecdsa_generate_private_key(hx509_context context, struct hx509_generate_private_context *ctx, hx509_private_key private_key) argument [all...] |
H A D | crypto.c | 371 sig->length = RSA_size(signer->private_key.rsa); 381 signer->private_key.rsa, 407 hx509_private_key private_key) 413 private_key->private_key.rsa = 415 if (private_key->private_key.rsa == NULL) { 420 private_key->signature_alg = ASN1_OID_ID_PKCS1_SHA1WITHRSAENCRYPTION; 433 hx509_private_key private_key, 440 len = i2d_RSAPublicKey(private_key 402 rsa_private_key_import(hx509_context context, const AlgorithmIdentifier *keyai, const void *data, size_t len, hx509_key_format_t format, hx509_private_key private_key) argument 432 rsa_private_key2SPKI(hx509_context context, hx509_private_key private_key, SubjectPublicKeyInfo *spki) argument 469 rsa_generate_private_key(hx509_context context, struct hx509_generate_private_context *ctx, hx509_private_key private_key) argument 1320 hx509_parse_private_key(hx509_context context, const AlgorithmIdentifier *keyai, const void *data, size_t len, hx509_key_format_t format, hx509_private_key *private_key) argument 1356 hx509_private_key2SPKI(hx509_context context, hx509_private_key private_key, SubjectPublicKeyInfo *spki) argument 1418 _hx509_generate_private_key(hx509_context context, struct hx509_generate_private_context *ctx, hx509_private_key *private_key) argument 2531 match_keys_rsa(hx509_cert c, hx509_private_key private_key) argument 2627 match_keys_ec(hx509_cert c, hx509_private_key private_key) argument [all...] |
/netbsd-current/crypto/external/bsd/openssl/dist/crypto/ec/curve448/ |
H A D | curve448_local.h | 15 const uint8_t public_key[57], const uint8_t private_key[57],
|
H A D | eddsa.c | 378 const uint8_t private_key[57], const uint8_t *context, 381 return ossl_c448_ed448_sign(ctx, out_sig, private_key, public_key, message, 398 const uint8_t public_key[57], const uint8_t private_key[57], 401 return ossl_c448_ed448_sign_prehash(ctx, out_sig, private_key, public_key, 419 const uint8_t private_key[57], const char *propq) 421 return ossl_c448_ed448_derive_public_key(ctx, out_public_key, private_key, 376 ossl_ed448_sign(OSSL_LIB_CTX *ctx, uint8_t *out_sig, const uint8_t *message, size_t message_len, const uint8_t public_key[57], const uint8_t private_key[57], const uint8_t *context, size_t context_len, const char *propq) argument 397 ossl_ed448ph_sign(OSSL_LIB_CTX *ctx, uint8_t *out_sig, const uint8_t hash[64], const uint8_t public_key[57], const uint8_t private_key[57], const uint8_t *context, size_t context_len, const char *propq) argument 418 ossl_ed448_public_from_private(OSSL_LIB_CTX *ctx, uint8_t out_public_key[57], const uint8_t private_key[57], const char *propq) argument
|
/netbsd-current/crypto/external/cpl/trousers/dist/src/tspi/daa/ |
H A D | daa_debug.h | 8 DAA_PRIVATE_KEY_internal *private_key; member in struct:tdKEY_PAIR_WITH_PROOF_internal 39 const DAA_PRIVATE_KEY_internal *private_key
|
H A D | daa_structs.c | 271 DAA_PRIVATE_KEY_internal *private_key = local 274 private_key->p_prime = bi_new_ptr(); bi_set( private_key->p_prime, pPrime); 275 private_key->q_prime = bi_new_ptr(); bi_set( private_key->q_prime, qPrime); 276 private_key->productPQprime = bi_new_ptr(); 277 bi_mul( private_key->productPQprime, pPrime, qPrime); 278 return private_key; 283 save_DAA_PRIVATE_KEY(FILE *file, const DAA_PRIVATE_KEY_internal *private_key) 285 BI_SAVE( private_key 306 e_2_i_TSS_DAA_PRIVATE_KEY(TSS_DAA_PRIVATE_KEY *private_key) argument [all...] |
/netbsd-current/crypto/external/bsd/openssl/dist/include/crypto/ |
H A D | ecx.h | 87 int ossl_x25519(uint8_t out_shared_key[32], const uint8_t private_key[32], 90 const uint8_t private_key[32]); 94 const uint8_t private_key[32], 98 const uint8_t public_key[32], const uint8_t private_key[32], 107 const uint8_t private_key[57], const char *propq); 111 const uint8_t private_key[57], const uint8_t *context, 120 ossl_x448(uint8_t out_shared_key[56], const uint8_t private_key[56], 124 const uint8_t private_key[56]);
|
/netbsd-current/crypto/external/bsd/openssl.old/dist/crypto/asn1/ |
H A D | n_pkey.c | 28 ASN1_OCTET_STRING *private_key; 53 ASN1_SIMPLE(NETSCAPE_PKEY, private_key, ASN1_OCTET_STRING)
|
/netbsd-current/crypto/external/bsd/openssl/dist/crypto/asn1/ |
H A D | n_pkey.c | 28 ASN1_OCTET_STRING *private_key; member in struct:netscape_pkey_st 53 ASN1_SIMPLE(NETSCAPE_PKEY, private_key, ASN1_OCTET_STRING)
|
/netbsd-current/crypto/external/cpl/trousers/dist/src/tspi/daa/daa_issuer/ |
H A D | issuer_setup.c | 60 TSS_DAA_PRIVATE_KEY *private_key; local 128 private_key = key_pair->private_key; 129 private_key_internal = e_2_i_TSS_DAA_PRIVATE_KEY( private_key); 137 key_pair_with_proof->private_key = private_key_internal;
|
/netbsd-current/external/bsd/pkg_install/dist/lib/ |
H A D | pkcs7.c | 237 EVP_PKEY *private_key; 247 private_key = NULL; 280 private_key = PEM_read_PrivateKey(f, NULL, ssl_pass_cb, NULL); 282 if (private_key == NULL) { 287 if (X509_check_private_key(certificate, private_key) != 1) { 295 p7 = PKCS7_sign(certificate, private_key, cert_chain, in, 316 EVP_PKEY_free(private_key);
|
/netbsd-current/usr.bin/nbsvtool/ |
H A D | nbsvtool.c | 65 * `private_key' must be given. An additional hint to the verifier how 71 sign_file(X509 *cert, EVP_PKEY *private_key, STACK_OF(X509) *cert_chain, argument 86 p7 = PKCS7_sign(cert, private_key, cert_chain, in, 234 EVP_PKEY *private_key; member in struct:__anon38 271 crypto_state.private_key = 274 if (crypto_state.private_key == NULL) 278 crypto_state.private_key); 375 crypto_state.private_key,
|
/netbsd-current/external/bsd/wpa/dist/src/tls/ |
H A D | tlsv1_cred.h | 41 const char *private_key,
|
H A D | rsa.c | 18 int private_key; /* whether private key is set */ member in struct:crypto_rsa_key 21 /* The following parameters are available only if private_key is set */ 160 key->private_key = 1; 272 if (use_private && !key->private_key)
|
/netbsd-current/external/bsd/wpa/dist/wpa_supplicant/ |
H A D | wpa_supplicant.conf | 174 # private_key option appear to be a PKCS#11 URI, and these options 569 # For example: private_key="pkcs11:manufacturer=piv_II;id=%01" 574 # private_key: File path to client private key file (PEM/DER/PFX) 582 # For example: private_key="pkcs11:manufacturer=piv_II;id=%01" 585 # configuring private_key in one of the following formats: 591 # For example: private_key="hash://63093aa9c47f56ae88334c7b65a4" 1146 # private_key: File path to client private key file (PEM/DER/PFX) 1152 # configuring private_key in one of the following formats: 1155 # for example: private_key="hash://63093aa9c47f56ae88334c7b65a4" 1254 # (private_key/client_cer [all...] |
/netbsd-current/external/bsd/wpa/dist/src/eap_peer/ |
H A D | eap_config.h | 132 * private_key - File path to client private key file (PEM/DER/PFX) 141 * configuring private_key in one of the following formats: 147 * For example: private_key="hash://63093aa9c47f56ae88334c7b65a4" 156 char *private_key; member in struct:eap_peer_config 349 * This field is like private_key, but used for phase 2 (inside 477 * (private_key/client_cert) is no used and TLS session resumption was
|
/netbsd-current/crypto/external/cpl/trousers/dist/src/include/daa/ |
H A D | daa_structs.h | 108 const DAA_PRIVATE_KEY_internal *private_key 121 TSS_DAA_PRIVATE_KEY *private_key 265 DAA_PRIVATE_KEY_internal *private_key; member in struct:tdKEY_PAIR_WITH_PROOF_internal
|
/netbsd-current/crypto/external/cpl/trousers/dist/src/tspi/daa/daa_platform/ |
H A D | test_join.c | 46 DAA_PRIVATE_KEY_internal *private_key; member in struct:tdIssuer 209 issuer->key_pair_extern->private_key = i_2_e_TSS_DAA_PRIVATE_KEY( 210 key_pair_with_proof->private_key, 213 issuer->private_key = key_pair_with_proof->private_key;
|
/netbsd-current/external/bsd/wpa/dist/src/crypto/ |
H A D | tls_gnutls.c | 546 if (params->client_cert && params->private_key) { 549 params->client_cert, params->private_key); 552 conn->xcred, params->client_cert, params->private_key, 557 conn->xcred, params->client_cert, params->private_key, 567 params->private_key, GNUTLS_X509_FMT_PEM, 572 params->private_key, GNUTLS_X509_FMT_PEM); 586 } else if (params->private_key) { 592 params->private_key); 594 conn->xcred, params->private_key, GNUTLS_X509_FMT_DER, 597 wpa_printf(MSG_DEBUG, "Failed to load private_key i [all...] |
/netbsd-current/external/bsd/wpa/dist/src/ap/ |
H A D | authsrv.c | 201 hapd->conf->private_key || hapd->conf->dh_file || 232 params.private_key = hapd->conf->private_key;
|
/netbsd-current/crypto/external/cpl/trousers/dist/src/tspi/ |
H A D | tspi_daa.c | 223 tss_daa_key_pair->private_key = i_2_e_TSS_DAA_PRIVATE_KEY( key_proof->private_key, 276 tss_daa_key_pair->private_key = i_2_e_TSS_DAA_PRIVATE_KEY( key_proof->private_key,
|