private_key      1295 crypto/ecc.c   			      const u64 *private_key, unsigned int ndigits)
private_key      1300 crypto/ecc.c   	if (!private_key)
private_key      1307 crypto/ecc.c   	if (vli_cmp(one, private_key, ndigits) != -1)
private_key      1311 crypto/ecc.c   	if (vli_cmp(res, private_key, ndigits) != 1)
private_key      1318 crypto/ecc.c   		     const u64 *private_key, unsigned int private_key_len)
private_key      1328 crypto/ecc.c   	return __ecc_is_key_valid(curve, private_key, ndigits);
private_key      1386 crypto/ecc.c   		     const u64 *private_key, u64 *public_key)
private_key      1393 crypto/ecc.c   	if (!private_key || !curve || ndigits > ARRAY_SIZE(priv)) {
private_key      1398 crypto/ecc.c   	ecc_swap_digits(private_key, priv, ndigits);
private_key      1456 crypto/ecc.c   			      const u64 *private_key, const u64 *public_key,
private_key      1466 crypto/ecc.c   	if (!private_key || !public_key || !curve ||
private_key      1488 crypto/ecc.c   	ecc_swap_digits(private_key, priv, ndigits);
private_key        84 crypto/ecc.h   		     const u64 *private_key, unsigned int private_key_len);
private_key       112 crypto/ecc.h   		     const u64 *private_key, u64 *public_key);
private_key       130 crypto/ecc.h   			      const u64 *private_key, const u64 *public_key,
private_key        18 crypto/ecdh.c  	u64 private_key[ECC_MAX_DIGITS];
private_key        54 crypto/ecdh.c  				       ctx->private_key);
private_key        60 crypto/ecdh.c  	memcpy(ctx->private_key, params.key, params.key_size);
private_key       103 crypto/ecdh.c  						ctx->private_key, public_key,
private_key       109 crypto/ecdh.c  				       ctx->private_key, public_key);
private_key      1107 fs/ecryptfs/keystore.c 		(*sig) = auth_tok->token.private_key.signature;
private_key      1294 fs/ecryptfs/keystore.c 	ecryptfs_to_hex((*new_auth_tok)->token.private_key.signature,
private_key      1898 fs/ecryptfs/keystore.c 		memcpy(&(candidate_auth_tok->token.private_key),
private_key      1899 fs/ecryptfs/keystore.c 		       &(matching_auth_tok->token.private_key),
private_key      1971 fs/ecryptfs/keystore.c 	rc = write_tag_66_packet(auth_tok->token.private_key.signature,
private_key      2030 fs/ecryptfs/keystore.c 	ecryptfs_from_hex(key_rec->sig, auth_tok->token.private_key.signature,
private_key      2046 fs/ecryptfs/keystore.c 			auth_tok->token.private_key.key_size;
private_key       102 include/linux/ecryptfs.h 		struct ecryptfs_private_key private_key;
private_key       122 net/bluetooth/ecdh_helper.c int set_ecdh_privkey(struct crypto_kpp *tfm, const u8 private_key[32])
private_key       131 net/bluetooth/ecdh_helper.c 	if (private_key) {
private_key       135 net/bluetooth/ecdh_helper.c 		swap_digits((u64 *)private_key, (u64 *)tmp, 4);
private_key        28 net/bluetooth/ecdh_helper.h int set_ecdh_privkey(struct crypto_kpp *tfm, const u8 *private_key);
private_key       137 scripts/sign-file.c 	EVP_PKEY *private_key;
private_key       153 scripts/sign-file.c 		private_key = ENGINE_load_private_key(e, private_key_name,
private_key       155 scripts/sign-file.c 		ERR(!private_key, "%s", private_key_name);
private_key       161 scripts/sign-file.c 		private_key = PEM_read_bio_PrivateKey(b, NULL, pem_pw_cb,
private_key       163 scripts/sign-file.c 		ERR(!private_key, "%s", private_key_name);
private_key       167 scripts/sign-file.c 	return private_key;
private_key       222 scripts/sign-file.c 	EVP_PKEY *private_key;
private_key       297 scripts/sign-file.c 		private_key = read_private_key(private_key_name);
private_key       313 scripts/sign-file.c 		ERR(!CMS_add1_signer(cms, x509, private_key, digest_algo,
private_key       322 scripts/sign-file.c 		pkcs7 = PKCS7_sign(x509, private_key, NULL, bm,