Home
last modified time | relevance | path

Searched refs:private_key (Results 1 – 15 of 15) sorted by relevance

/linux/scripts/
H A Dsign-file.c90 EVP_PKEY *private_key = NULL; in read_private_key_pkcs11() local
110 private_key = OSSL_STORE_INFO_get1_PKEY(info); in read_private_key_pkcs11()
111 ERR(!private_key, "OSSL_STORE_INFO_get1_PKEY"); in read_private_key_pkcs11()
114 if (private_key) in read_private_key_pkcs11()
131 private_key = ENGINE_load_private_key(e, private_key_name, NULL, NULL); in read_private_key_pkcs11()
132 ERR(!private_key, "%s", private_key_name); in read_private_key_pkcs11()
137 return private_key; in read_private_key_pkcs11()
145 EVP_PKEY *private_key; in read_private_key() local
150 private_key = PEM_read_bio_PrivateKey(b, NULL, pem_pw_cb, in read_private_key()
152 ERR(!private_key, "%s", private_key_name); in read_private_key()
[all …]
/linux/tools/bpf/bpftool/
H A Dsign.c65 EVP_PKEY *private_key = NULL; in read_private_key() local
69 private_key = PEM_read_bio_PrivateKey(b, NULL, NULL, NULL); in read_private_key()
71 DISPLAY_OSSL_ERR(!private_key); in read_private_key()
72 return private_key; in read_private_key()
134 EVP_PKEY *private_key = NULL; in bpftool_prog_sign() local
146 private_key = read_private_key(private_key_path); in bpftool_prog_sign()
147 if (!private_key) { in bpftool_prog_sign()
166 if (!CMS_add1_signer(cms, x509, private_key, EVP_sha256(), in bpftool_prog_sign()
213 EVP_PKEY_free(private_key); in bpftool_prog_sign()
/linux/crypto/
H A Decdh.c18 u64 private_key[ECC_MAX_DIGITS]; member
37 memset(ctx->private_key, 0, sizeof(ctx->private_key)); in ecdh_set_secret()
41 ctx->private_key); in ecdh_set_secret()
44 ctx->private_key, ctx->ndigits); in ecdh_set_secret()
47 ctx->private_key, params.key_size) < 0) { in ecdh_set_secret()
48 memzero_explicit(ctx->private_key, params.key_size); in ecdh_set_secret()
93 ctx->private_key, public_key, in ecdh_compute_value()
99 ctx->private_key, public_key); in ecdh_compute_value()
H A Decc.c1469 const u64 *private_key, unsigned int ndigits) in __ecc_is_key_valid() argument
1474 if (!private_key) in __ecc_is_key_valid()
1481 if (vli_cmp(one, private_key, ndigits) != -1) in __ecc_is_key_valid()
1485 if (vli_cmp(res, private_key, ndigits) != 1) in __ecc_is_key_valid()
1492 const u64 *private_key, unsigned int private_key_len) in ecc_is_key_valid() argument
1502 return __ecc_is_key_valid(curve, private_key, ndigits); in ecc_is_key_valid()
1514 u64 *private_key) in ecc_gen_privkey() argument
1544 (u8 *)private_key, nbytes); in ecc_gen_privkey()
1550 if (__ecc_is_key_valid(curve, private_key, ndigits)) in ecc_gen_privkey()
1558 const u64 *private_key, u64 *public_key) in ecc_make_pub_key() argument
[all …]
/linux/include/crypto/internal/
H A Decc.h96 const u64 *private_key, unsigned int private_key_len);
111 u64 *private_key);
125 const u64 *private_key, u64 *public_key);
143 const u64 *private_key, const u64 *public_key,
/linux/drivers/crypto/intel/keembay/
H A Dkeembay-ocs-ecc.c102 u64 private_key[KMB_ECC_VLI_MAX_DIGITS]; member
455 const u64 *private_key, size_t private_key_len) in kmb_ecc_is_key_valid() argument
464 if (!private_key) in kmb_ecc_is_key_valid()
468 if (vli_cmp(one, private_key, ndigits) != -1) in kmb_ecc_is_key_valid()
473 if (vli_cmp(res, private_key, ndigits) != 1) in kmb_ecc_is_key_valid()
554 rc = kmb_ecc_gen_privkey(tctx->curve, tctx->private_key); in kmb_ocs_ecdh_set_secret()
563 ecc_swap_digits((const u64 *)params.key, tctx->private_key, in kmb_ocs_ecdh_set_secret()
624 rc = kmb_ecc_point_mult(ecc_dev, result, pk, tctx->private_key, curve); in kmb_ecc_do_shared_secret()
676 rc = kmb_ecc_point_mult(tctx->ecc_dev, pk, &curve->g, tctx->private_key, in kmb_ecc_do_public_key()
813 memzero_explicit(tctx->private_key, sizeof(*tctx->private_key)); in kmb_ocs_ecdh_exit_tfm()
/linux/net/bluetooth/
H A Decdh_helper.c101 int set_ecdh_privkey(struct crypto_kpp *tfm, const u8 private_key[32]) in set_ecdh_privkey()
108 if (private_key) { in set_ecdh_privkey()
112 swap_digits((u64 *)private_key, (u64 *)tmp, 4); in set_ecdh_privkey()
H A Decdh_helper.h28 int set_ecdh_privkey(struct crypto_kpp *tfm, const u8 private_key[32]);
/linux/drivers/net/wireguard/
H A Dnetlink.c523 u8 *private_key = nla_data(info->attrs[WGDEVICE_A_PRIVATE_KEY]); in wg_set_device_doit() local
529 private_key, NOISE_PUBLIC_KEY_LEN)) in wg_set_device_doit()
535 if (curve25519_generate_public(public_key, private_key)) { in wg_set_device_doit()
546 wg_noise_set_static_identity_private_key(&wg->static_identity, private_key); in wg_set_device_doit()
H A Dnoise.h116 const u8 private_key[NOISE_PUBLIC_KEY_LEN]);
H A Dnoise.c296 const u8 private_key[NOISE_PUBLIC_KEY_LEN]) in wg_noise_set_static_identity_private_key()
298 memcpy(static_identity->static_private, private_key, in wg_noise_set_static_identity_private_key()
302 static_identity->static_public, private_key); in wg_noise_set_static_identity_private_key()
/linux/include/linux/
H A Decryptfs.h102 struct ecryptfs_private_key private_key; member
/linux/fs/ecryptfs/
H A Dkeystore.c1068 (*sig) = auth_tok->token.private_key.signature; in ecryptfs_get_auth_tok_sig()
1257 ecryptfs_to_hex((*new_auth_tok)->token.private_key.signature, in parse_tag_1_packet()
1859 memcpy(&(candidate_auth_tok->token.private_key), in ecryptfs_parse_packet_set()
1860 &(matching_auth_tok->token.private_key), in ecryptfs_parse_packet_set()
1932 rc = write_tag_66_packet(auth_tok->token.private_key.signature, in pki_encrypt_session_key()
1991 ecryptfs_from_hex(key_rec->sig, auth_tok->token.private_key.signature, in write_tag_1_packet()
2007 auth_tok->token.private_key.key_size; in write_tag_1_packet()
/linux/tools/bpf/bpftool/Documentation/
H A Dbpftool-gen.rst19 …| | { **-L** | **--use-loader** } | [ { **-S** | **--sign** } {**-k** <private_key.pem>} **-i** <c…
193 -k <private_key.pem>
H A Dbpftool-prog.rst21 { **-L** | **--use-loader** } | [ { **-S** | **--sign** } **-k** <private_key.pem> **-i** <certific…
256 -k <private_key.pem>