| /linux/scripts/ |
| H A D | sign-file.c | 90 EVP_PKEY *private_key = NULL; in read_private_key_pkcs11() local 110 private_key = OSSL_STORE_INFO_get1_PKEY(info); in read_private_key_pkcs11() 111 ERR(!private_key, "OSSL_STORE_INFO_get1_PKEY"); in read_private_key_pkcs11() 114 if (private_key) in read_private_key_pkcs11() 131 private_key = ENGINE_load_private_key(e, private_key_name, NULL, NULL); in read_private_key_pkcs11() 132 ERR(!private_key, "%s", private_key_name); in read_private_key_pkcs11() 137 return private_key; in read_private_key_pkcs11() 145 EVP_PKEY *private_key; in read_private_key() local 150 private_key = PEM_read_bio_PrivateKey(b, NULL, pem_pw_cb, in read_private_key() 152 ERR(!private_key, "%s", private_key_name); in read_private_key() [all …]
|
| /linux/tools/bpf/bpftool/ |
| H A D | sign.c | 65 EVP_PKEY *private_key = NULL; in read_private_key() local 69 private_key = PEM_read_bio_PrivateKey(b, NULL, NULL, NULL); in read_private_key() 71 DISPLAY_OSSL_ERR(!private_key); in read_private_key() 72 return private_key; in read_private_key() 134 EVP_PKEY *private_key = NULL; in bpftool_prog_sign() local 146 private_key = read_private_key(private_key_path); in bpftool_prog_sign() 147 if (!private_key) { in bpftool_prog_sign() 166 if (!CMS_add1_signer(cms, x509, private_key, EVP_sha256(), in bpftool_prog_sign() 213 EVP_PKEY_free(private_key); in bpftool_prog_sign()
|
| /linux/crypto/ |
| H A D | ecdh.c | 18 u64 private_key[ECC_MAX_DIGITS]; member 37 memset(ctx->private_key, 0, sizeof(ctx->private_key)); in ecdh_set_secret() 41 ctx->private_key); in ecdh_set_secret() 44 ctx->private_key, ctx->ndigits); in ecdh_set_secret() 47 ctx->private_key, params.key_size) < 0) { in ecdh_set_secret() 48 memzero_explicit(ctx->private_key, params.key_size); in ecdh_set_secret() 93 ctx->private_key, public_key, in ecdh_compute_value() 99 ctx->private_key, public_key); in ecdh_compute_value()
|
| H A D | ecc.c | 1469 const u64 *private_key, unsigned int ndigits) in __ecc_is_key_valid() argument 1474 if (!private_key) in __ecc_is_key_valid() 1481 if (vli_cmp(one, private_key, ndigits) != -1) in __ecc_is_key_valid() 1485 if (vli_cmp(res, private_key, ndigits) != 1) in __ecc_is_key_valid() 1492 const u64 *private_key, unsigned int private_key_len) in ecc_is_key_valid() argument 1502 return __ecc_is_key_valid(curve, private_key, ndigits); in ecc_is_key_valid() 1514 u64 *private_key) in ecc_gen_privkey() argument 1544 (u8 *)private_key, nbytes); in ecc_gen_privkey() 1550 if (__ecc_is_key_valid(curve, private_key, ndigits)) in ecc_gen_privkey() 1558 const u64 *private_key, u64 *public_key) in ecc_make_pub_key() argument [all …]
|
| /linux/include/crypto/internal/ |
| H A D | ecc.h | 96 const u64 *private_key, unsigned int private_key_len); 111 u64 *private_key); 125 const u64 *private_key, u64 *public_key); 143 const u64 *private_key, const u64 *public_key,
|
| /linux/drivers/crypto/intel/keembay/ |
| H A D | keembay-ocs-ecc.c | 102 u64 private_key[KMB_ECC_VLI_MAX_DIGITS]; member 455 const u64 *private_key, size_t private_key_len) in kmb_ecc_is_key_valid() argument 464 if (!private_key) in kmb_ecc_is_key_valid() 468 if (vli_cmp(one, private_key, ndigits) != -1) in kmb_ecc_is_key_valid() 473 if (vli_cmp(res, private_key, ndigits) != 1) in kmb_ecc_is_key_valid() 554 rc = kmb_ecc_gen_privkey(tctx->curve, tctx->private_key); in kmb_ocs_ecdh_set_secret() 563 ecc_swap_digits((const u64 *)params.key, tctx->private_key, in kmb_ocs_ecdh_set_secret() 624 rc = kmb_ecc_point_mult(ecc_dev, result, pk, tctx->private_key, curve); in kmb_ecc_do_shared_secret() 676 rc = kmb_ecc_point_mult(tctx->ecc_dev, pk, &curve->g, tctx->private_key, in kmb_ecc_do_public_key() 813 memzero_explicit(tctx->private_key, sizeof(*tctx->private_key)); in kmb_ocs_ecdh_exit_tfm()
|
| /linux/net/bluetooth/ |
| H A D | ecdh_helper.c | 101 int set_ecdh_privkey(struct crypto_kpp *tfm, const u8 private_key[32]) in set_ecdh_privkey() 108 if (private_key) { in set_ecdh_privkey() 112 swap_digits((u64 *)private_key, (u64 *)tmp, 4); in set_ecdh_privkey()
|
| H A D | ecdh_helper.h | 28 int set_ecdh_privkey(struct crypto_kpp *tfm, const u8 private_key[32]);
|
| /linux/drivers/net/wireguard/ |
| H A D | netlink.c | 523 u8 *private_key = nla_data(info->attrs[WGDEVICE_A_PRIVATE_KEY]); in wg_set_device_doit() local 529 private_key, NOISE_PUBLIC_KEY_LEN)) in wg_set_device_doit() 535 if (curve25519_generate_public(public_key, private_key)) { in wg_set_device_doit() 546 wg_noise_set_static_identity_private_key(&wg->static_identity, private_key); in wg_set_device_doit()
|
| H A D | noise.h | 116 const u8 private_key[NOISE_PUBLIC_KEY_LEN]);
|
| H A D | noise.c | 296 const u8 private_key[NOISE_PUBLIC_KEY_LEN]) in wg_noise_set_static_identity_private_key() 298 memcpy(static_identity->static_private, private_key, in wg_noise_set_static_identity_private_key() 302 static_identity->static_public, private_key); in wg_noise_set_static_identity_private_key()
|
| /linux/include/linux/ |
| H A D | ecryptfs.h | 102 struct ecryptfs_private_key private_key; member
|
| /linux/fs/ecryptfs/ |
| H A D | keystore.c | 1068 (*sig) = auth_tok->token.private_key.signature; in ecryptfs_get_auth_tok_sig() 1257 ecryptfs_to_hex((*new_auth_tok)->token.private_key.signature, in parse_tag_1_packet() 1859 memcpy(&(candidate_auth_tok->token.private_key), in ecryptfs_parse_packet_set() 1860 &(matching_auth_tok->token.private_key), in ecryptfs_parse_packet_set() 1932 rc = write_tag_66_packet(auth_tok->token.private_key.signature, in pki_encrypt_session_key() 1991 ecryptfs_from_hex(key_rec->sig, auth_tok->token.private_key.signature, in write_tag_1_packet() 2007 auth_tok->token.private_key.key_size; in write_tag_1_packet()
|
| /linux/tools/bpf/bpftool/Documentation/ |
| H A D | bpftool-gen.rst | 19 …| | { **-L** | **--use-loader** } | [ { **-S** | **--sign** } {**-k** <private_key.pem>} **-i** <c… 193 -k <private_key.pem>
|
| H A D | bpftool-prog.rst | 21 { **-L** | **--use-loader** } | [ { **-S** | **--sign** } **-k** <private_key.pem> **-i** <certific… 256 -k <private_key.pem>
|