private_key 1295 crypto/ecc.c const u64 *private_key, unsigned int ndigits) private_key 1300 crypto/ecc.c if (!private_key) private_key 1307 crypto/ecc.c if (vli_cmp(one, private_key, ndigits) != -1) private_key 1311 crypto/ecc.c if (vli_cmp(res, private_key, ndigits) != 1) private_key 1318 crypto/ecc.c const u64 *private_key, unsigned int private_key_len) private_key 1328 crypto/ecc.c return __ecc_is_key_valid(curve, private_key, ndigits); private_key 1386 crypto/ecc.c const u64 *private_key, u64 *public_key) private_key 1393 crypto/ecc.c if (!private_key || !curve || ndigits > ARRAY_SIZE(priv)) { private_key 1398 crypto/ecc.c ecc_swap_digits(private_key, priv, ndigits); private_key 1456 crypto/ecc.c const u64 *private_key, const u64 *public_key, private_key 1466 crypto/ecc.c if (!private_key || !public_key || !curve || private_key 1488 crypto/ecc.c ecc_swap_digits(private_key, priv, ndigits); private_key 84 crypto/ecc.h const u64 *private_key, unsigned int private_key_len); private_key 112 crypto/ecc.h const u64 *private_key, u64 *public_key); private_key 130 crypto/ecc.h const u64 *private_key, const u64 *public_key, private_key 18 crypto/ecdh.c u64 private_key[ECC_MAX_DIGITS]; private_key 54 crypto/ecdh.c ctx->private_key); private_key 60 crypto/ecdh.c memcpy(ctx->private_key, params.key, params.key_size); private_key 103 crypto/ecdh.c ctx->private_key, public_key, private_key 109 crypto/ecdh.c ctx->private_key, public_key); private_key 1107 fs/ecryptfs/keystore.c (*sig) = auth_tok->token.private_key.signature; private_key 1294 fs/ecryptfs/keystore.c ecryptfs_to_hex((*new_auth_tok)->token.private_key.signature, private_key 1898 fs/ecryptfs/keystore.c memcpy(&(candidate_auth_tok->token.private_key), private_key 1899 fs/ecryptfs/keystore.c &(matching_auth_tok->token.private_key), private_key 1971 fs/ecryptfs/keystore.c rc = write_tag_66_packet(auth_tok->token.private_key.signature, private_key 2030 fs/ecryptfs/keystore.c ecryptfs_from_hex(key_rec->sig, auth_tok->token.private_key.signature, private_key 2046 fs/ecryptfs/keystore.c auth_tok->token.private_key.key_size; private_key 102 include/linux/ecryptfs.h struct ecryptfs_private_key private_key; private_key 122 net/bluetooth/ecdh_helper.c int set_ecdh_privkey(struct crypto_kpp *tfm, const u8 private_key[32]) private_key 131 net/bluetooth/ecdh_helper.c if (private_key) { private_key 135 net/bluetooth/ecdh_helper.c swap_digits((u64 *)private_key, (u64 *)tmp, 4); private_key 28 net/bluetooth/ecdh_helper.h int set_ecdh_privkey(struct crypto_kpp *tfm, const u8 *private_key); private_key 137 scripts/sign-file.c EVP_PKEY *private_key; private_key 153 scripts/sign-file.c private_key = ENGINE_load_private_key(e, private_key_name, private_key 155 scripts/sign-file.c ERR(!private_key, "%s", private_key_name); private_key 161 scripts/sign-file.c private_key = PEM_read_bio_PrivateKey(b, NULL, pem_pw_cb, private_key 163 scripts/sign-file.c ERR(!private_key, "%s", private_key_name); private_key 167 scripts/sign-file.c return private_key; private_key 222 scripts/sign-file.c EVP_PKEY *private_key; private_key 297 scripts/sign-file.c private_key = read_private_key(private_key_name); private_key 313 scripts/sign-file.c ERR(!CMS_add1_signer(cms, x509, private_key, digest_algo, private_key 322 scripts/sign-file.c pkcs7 = PKCS7_sign(x509, private_key, NULL, bm,