/freebsd/crypto/openssh/ |
H A D | kexecdh.c | 52 EC_KEY *client_key = NULL; in kex_ecdh_keypair() local 58 if ((client_key = EC_KEY_new_by_curve_name(kex->ec_nid)) == NULL) { in kex_ecdh_keypair() 62 if (EC_KEY_generate_key(client_key) != 1) { in kex_ecdh_keypair() 66 group = EC_KEY_get0_group(client_key); in kex_ecdh_keypair() 67 public_key = EC_KEY_get0_public_key(client_key); in kex_ecdh_keypair() 78 sshkey_dump_ec_key(client_key); in kex_ecdh_keypair() 80 kex->ec_client_key = client_key; in kex_ecdh_keypair() 82 client_key = NULL; /* owned by the kex */ in kex_ecdh_keypair() 86 EC_KEY_free(client_key); in kex_ecdh_keypair()
|
/freebsd/contrib/wpa/hs20/client/ |
H A D | osu_client.h | 81 const char *client_cert, const char *client_key, 86 const char *client_cert, const char *client_key, 99 const char *client_cert, const char *client_key, 104 const char *client_cert, const char *client_key,
|
H A D | oma_dm_client.c | 943 const char *client_key) in oma_dm_send_recv() argument 960 client_cert, client_key, NULL); in oma_dm_send_recv() 1251 const char *client_cert, const char *client_key, in oma_dm_pol_upd() argument 1270 cred_password, client_cert, client_key); in oma_dm_pol_upd() 1298 const char *client_cert, const char *client_key, in oma_dm_sub_rem() argument 1317 cred_password, client_cert, client_key); in oma_dm_sub_rem()
|
H A D | est.c | 656 const char *client_cert = NULL, *client_key = NULL; in est_simple_enroll() local 687 client_key = client_key_buf; in est_simple_enroll() 696 ctx->ca_fname, user, pw, client_cert, client_key, in est_simple_enroll()
|
H A D | spp_client.c | 786 const char *client_cert, const char *client_key, in spp_sub_rem() argument 798 client_key) == 0) { in spp_sub_rem() 933 const char *client_cert, const char *client_key, in spp_pol_upd() argument 944 cred_password, client_cert, client_key) == 0) { in spp_pol_upd()
|
H A D | osu_client.c | 2601 char *client_key = NULL; in cmd_sub_rem() local 2704 client_key = client_key_buf; in cmd_sub_rem() 2732 client_cert, client_key, in cmd_sub_rem() 2736 client_cert, client_key, in cmd_sub_rem() 2760 char *client_key = NULL; in cmd_pol_upd() local 2869 client_key = client_key_buf; in cmd_pol_upd() 2887 client_cert, client_key, in cmd_pol_upd() 2891 client_cert, client_key, in cmd_pol_upd()
|
/freebsd/contrib/wpa/src/utils/ |
H A D | http-utils.h | 42 const char *client_key); 56 const char *client_cert, const char *client_key,
|
H A D | http_curl.c | 1330 const char *client_key) in setup_curl_post() argument 1368 if (client_cert && client_key) { in setup_curl_post() 1370 curl_easy_setopt(curl, CURLOPT_SSLKEY, client_key); in setup_curl_post() 1393 const char *client_key) in post_init_client() argument 1403 clone_str(&ctx->svc_client_key, client_key); in post_init_client() 1417 password, client_cert, client_key); in post_init_client() 1428 const char *client_key) in soap_init_client() argument 1431 client_cert, client_key) < 0) in soap_init_client() 1451 char *client_key = NULL; in soap_reinit_client() local 1461 clone_str(&client_key, ctx->svc_client_key); in soap_reinit_client() [all …]
|
/freebsd/crypto/openssl/test/ |
H A D | cmp_client_test.c | 38 static EVP_PKEY *client_key = NULL; variable 80 || !OSSL_CMP_CTX_set1_pkey(ctx, client_key) in set_up() 266 EVP_PKEY *key = raverified /* wrong key */ ? server_key : client_key; in test_exec_KUR_ses() 483 EVP_PKEY_free(client_key); in cleanup_tests() 514 || !TEST_ptr(client_key = load_pkey_pem(client_key_f, libctx)) in OPT_TEST_DECLARE_USAGE()
|
/freebsd/crypto/openssl/doc/man1/ |
H A D | tsget.pod | 169 client authentication (it will ask for the passphrase if F<client_key.pem> is 173 -k client_key.pem -c client_cert.pem file1.tsq 180 -k client_key.pem -c client_cert.pem'
|