private_key
return p->private_key;
return p->private_key ? 1 : 0;
if (p->private_key == NULL)
return _hx509_private_key_exportable(p->private_key);
if (p->private_key == NULL) {
p->private_key,
(*cert)->private_key = NULL;
_hx509_cert_assign_key(hx509_cert cert, hx509_private_key private_key)
if (cert->private_key)
hx509_private_key_free(&cert->private_key);
cert->private_key = _hx509_private_key_ref(private_key);
if (cert->private_key)
hx509_private_key_free(&cert->private_key);
hx509_private_key private_key;
free_private_key(struct private_key *key)
if (key->private_key)
hx509_private_key_free(&key->private_key);
hx509_private_key private_key,
struct private_key *key;
if (private_key) {
key->private_key = private_key;
&key->private_key);
struct private_key *value,
if (value->private_key)
_hx509_cert_assign_key(cert, value->private_key);
match_keys(hx509_context context, struct private_key *value, hx509_certs certs)
if (value->private_key == NULL) {
ret = _hx509_match_keys(c, value->private_key);
_hx509_cert_assign_key(c, value->private_key);
if (c->val.data[i]->private_key)
if (c->val.data[i]->private_key) {
(*keys)[nkeys++] = c->val.data[i]->private_key;
c->val.data[i]->private_key = NULL;
hx509_private_key private_key;
struct private_key **data;
hx509_private_key private_key)
hx509_private_key private_key)
private_key->private_key.dsa =
if (private_key->private_key.dsa == NULL)
private_key->signature_alg = ASN1_OID_ID_DSA_WITH_SHA1;
if (p->private_key.rsa == NULL) {
cleartext->length = RSA_size(p->private_key.rsa);
p->private_key.rsa,
hx509_private_key *private_key)
*private_key = NULL;
ret = hx509_private_key_init(private_key, ops, NULL);
ret = (*ops->import)(context, keyai, data, len, format, *private_key);
hx509_private_key_free(private_key);
hx509_private_key private_key,
const struct hx509_private_key_ops *ops = private_key->ops;
return (*ops->get_spki)(context, private_key, spki);
hx509_private_key *private_key)
*private_key = NULL;
ret = hx509_private_key_init(private_key, ops, NULL);
ret = (*ops->generate_private_key)(context, ctx, *private_key);
hx509_private_key_free(private_key);
(*key)->private_key.keydata = keydata;
if ((*key)->private_key.rsa)
RSA_free((*key)->private_key.rsa);
if ((*key)->private_key.ecdsa)
EC_KEY_free((*key)->private_key.ecdsa);
(*key)->private_key.rsa = NULL;
if (key->private_key.rsa)
RSA_free(key->private_key.rsa);
key->private_key.rsa = ptr;
match_keys_rsa(hx509_cert c, hx509_private_key private_key)
if (private_key->private_key.rsa == NULL)
rsa = private_key->private_key.rsa;
match_keys_ec(hx509_cert c, hx509_private_key private_key)
sig->length = ECDSA_size(signer->private_key.ecdsa);
sig->data, &siglen, signer->private_key.ecdsa);
group = EC_KEY_get0_group(signer->private_key.ecdsa);
sig->length = RSA_size(signer->private_key.rsa);
signer->private_key.rsa,
hx509_private_key private_key)
private_key->private_key.rsa =
if (private_key->private_key.rsa == NULL) {
} private_key;
private_key->signature_alg = ASN1_OID_ID_PKCS1_SHA1WITHRSAENCRYPTION;
hx509_private_key private_key,
len = i2d_RSAPublicKey(private_key->private_key.rsa, NULL);
i2d_RSAPublicKey(private_key->private_key.rsa, &pp);
hx509_private_key private_key)
private_key->private_key.rsa = RSA_new();
if (private_key->private_key.rsa == NULL) {
ret = RSA_generate_key_ex(private_key->private_key.rsa, bits, e, NULL);
private_key->signature_alg = ASN1_OID_ID_PKCS1_SHA1WITHRSAENCRYPTION;
ret = i2d_RSAPrivateKey(key->private_key.rsa, NULL);
i2d_RSAPrivateKey(key->private_key.rsa, &p);
RSA_get0_key(key->private_key.rsa, &n, NULL, NULL);
RSA_get0_key(key->private_key.rsa, NULL, &n, NULL);
hx509_private_key private_key,
hx509_private_key private_key)
private_key->private_key.ecdsa = d2i_ECPrivateKey(pkey, &p, len);
if (private_key->private_key.ecdsa == NULL) {
private_key->signature_alg = ASN1_OID_ID_ECDSA_WITH_SHA256;
hx509_private_key private_key = NULL;
ret = read_private_key(opt->ca_private_key_string, &private_key);
ret = hx509_private_key2SPKI(context, private_key, &spki);
cert_key = private_key;
private_key = cert_key;
ret = hx509_ca_sign_self(context, tbs, private_key, &cert);
if (private_key != cert_key)
hx509_private_key_free(&private_key);
CK_OBJECT_HANDLE key = p11rsa->private_key;
CK_OBJECT_HANDLE key = p11rsa->private_key;
p11rsa->private_key = object;
CK_OBJECT_HANDLE private_key;
ck_object_handle_t *private_key));
ck_object_handle_t *private_key));
libcrux_ml_kem_types_MlKemPrivateKey_55 *private_key,
Eurydice_array_to_slice((size_t)2400U, private_key->value, uint8_t),
libcrux_ml_kem_types_MlKemPrivateKey_55 *private_key,
libcrux_ml_kem_ind_cca_decapsulate_70(private_key, ciphertext, ret);
libcrux_ml_kem_types_MlKemPrivateKey_55 *private_key,
private_key, ciphertext, ret);
Eurydice_slice private_key, Eurydice_slice public_key,
uu____0, uu____1, uu____2 + Eurydice_slice_len(private_key, uint8_t),
private_key, uint8_t);
pointer = pointer + Eurydice_slice_len(private_key, uint8_t);
libcrux_ml_kem_types_MlKemPrivateKey_55 private_key =
libcrux_ml_kem_types_MlKemPrivateKey_55 uu____2 = private_key;
libcrux_ml_kem_types_MlKemPrivateKey_55 *private_key,
Eurydice_array_to_slice((size_t)2400U, private_key->value, uint8_t),
libcrux_ml_kem_types_MlKemPrivateKey_55 *private_key,
libcrux_ml_kem_ind_cca_decapsulate_700(private_key, ciphertext, ret);
libcrux_ml_kem_types_MlKemPrivateKey_55 *private_key,
private_key, ciphertext, ret);
libcrux_ml_kem_types_MlKemPrivateKey_55 private_key =
libcrux_ml_kem_types_MlKemPrivateKey_55 uu____2 = private_key;
libcrux_ml_kem_types_MlKemPrivateKey_55 *private_key,
Eurydice_array_to_subslice2(private_key->value, (size_t)384U * (size_t)3U,
private_key->value, (size_t)768U * (size_t)3U + (size_t)32U,
libcrux_ml_kem_types_MlKemPrivateKey_55 *private_key,
return libcrux_ml_kem_ind_cca_validate_private_key_e7(private_key,
libcrux_ml_kem_types_MlKemPrivateKey_55 *private_key,
private_key, ciphertext);
ck_object_handle_t *private_key));
ASN1_OCTET_STRING *private_key;
ASN1_SIMPLE(NETSCAPE_PKEY, private_key, ASN1_OCTET_STRING)
const uint8_t public_key[32], const uint8_t private_key[32],
|| !EVP_DigestUpdate(hash_ctx, private_key, 32)
const uint8_t private_key[32],
r = EVP_Digest(private_key, 32, az, NULL, sha512, NULL);
int ossl_x25519(uint8_t out_shared_key[32], const uint8_t private_key[32],
x25519_scalar_mult(out_shared_key, private_key, peer_public_value);
const uint8_t private_key[32])
memcpy(e, private_key, 32);
int ossl_x448(uint8_t out_shared_key[56], const uint8_t private_key[56],
return ossl_x448_int(out_shared_key, peer_public_value, private_key)
const uint8_t private_key[56])
ossl_x448_derive_public_key(out_public_value, private_key);
const uint8_t public_key[57], const uint8_t private_key[57],
return ossl_c448_ed448_sign(ctx, out_sig, private_key, public_key, message,
const uint8_t private_key[57], const char *propq)
return ossl_c448_ed448_derive_public_key(ctx, out_public_key, private_key,
const uint8_t private_key[57], const char *propq);
const uint8_t public_key[57], const uint8_t private_key[57],
int ossl_x448(uint8_t out_shared_key[56], const uint8_t private_key[56],
const uint8_t private_key[56]);
int ossl_x25519(uint8_t out_shared_key[32], const uint8_t private_key[32],
const uint8_t private_key[32]);
const uint8_t private_key[32],
const uint8_t public_key[32], const uint8_t private_key[32],
EVP_PKEY *private_key);
ML_KEM_KEY *private_key = NULL;
private_key = ossl_ml_kem_key_new(NULL, NULL, alg[i]);
if (private_key == NULL || public_key == NULL
private_key))
ciphertext, v->ctext_bytes, private_key))
private_key)))
private_key)))
ossl_ml_kem_key_free(private_key);
uint8_t private_key[WG_KEY_SIZE] = { 0 };
if (noise_local_keys(sc->sc_local, public_key, private_key) == 0) {
nvlist_add_binary(nvl, "private-key", private_key, WG_KEY_SIZE);
explicit_bzero(private_key, sizeof(private_key));