/freebsd/crypto/openssl/ssl/ |
H A D | ssl_rsa.c | 131 EVP_PKEY_free(c->pkeys[i].privatekey); in ssl_set_pkey() 133 c->pkeys[i].privatekey = pkey; in ssl_set_pkey() 248 if (c->pkeys[i].privatekey != NULL) { in ssl_set_cert() 253 EVP_PKEY_copy_parameters(pkey, c->pkeys[i].privatekey); in ssl_set_cert() 256 if (!X509_check_private_key(x, c->pkeys[i].privatekey)) { in ssl_set_cert() 262 EVP_PKEY_free(c->pkeys[i].privatekey); in ssl_set_cert() 263 c->pkeys[i].privatekey = NULL; in ssl_set_cert() 923 static int ssl_set_cert_and_key(SSL *ssl, SSL_CTX *ctx, X509 *x509, EVP_PKEY *privatekey, in ssl_set_cert_and_key() argument 951 if (privatekey == NULL) { in ssl_set_cert_and_key() 952 privatekey = pubkey; in ssl_set_cert_and_key() [all …]
|
H A D | ssl_cert.c | 120 if (cpk->privatekey != NULL) { in ssl_cert_dup() 121 rpk->privatekey = cpk->privatekey; in ssl_cert_dup() 122 EVP_PKEY_up_ref(cpk->privatekey); in ssl_cert_dup() 223 EVP_PKEY_free(cpk->privatekey); in ssl_cert_clear_certs() 224 cpk->privatekey = NULL; in ssl_cert_clear_certs() 330 if (cpk->x509 == x && cpk->privatekey) { in ssl_cert_select_current() 338 if (cpk->privatekey && cpk->x509 && !X509_cmp(cpk->x509, x)) { in ssl_cert_select_current() 361 if (cpk->x509 && cpk->privatekey) { in ssl_cert_set_current()
|
H A D | t1_lib.c | 1314 if (s->cert->pkeys[real_idx].privatekey != NULL) { in tls1_get_legacy_sigalg() 1329 if (s->cert->pkeys[real_idx].privatekey != NULL) { in tls1_get_legacy_sigalg() 2670 pk = cpk->privatekey; in tls1_check_chain() 2934 dh_secbits = EVP_PKEY_get_security_bits(s->s3.tmp.cert->privatekey); in ssl_get_auto_dh() 3156 s->cert->pkeys[idx].privatekey); in has_usable_cert() 3208 : s->cert->pkeys[lu->sig_idx].privatekey; in find_sig_alg() 3272 .privatekey); in tls_choose_sigalg() 3296 EVP_PKEY *pkey = s->cert->pkeys[sig_idx].privatekey; in tls_choose_sigalg()
|
H A D | ssl_lib.c | 1672 if (ctx->cert->key->privatekey == NULL) { in SSL_CTX_check_private_key() 1677 (ctx->cert->key->x509, ctx->cert->key->privatekey); in SSL_CTX_check_private_key() 1691 if (ssl->cert->key->privatekey == NULL) { in SSL_check_private_key() 1696 ssl->cert->key->privatekey); in SSL_check_private_key() 4222 return s->cert->key->privatekey; in SSL_get_privatekey() 4238 return ctx->cert->key->privatekey; in SSL_CTX_get0_privatekey()
|
H A D | ssl_conf.c | 994 if (p && !c->pkeys[i].privatekey) { in SSL_CONF_CTX_finish()
|
H A D | ssl_local.h | 1943 EVP_PKEY *privatekey; member 2366 && s->cert->pkeys[idx].privatekey != NULL; in ssl_has_cert()
|
/freebsd/sbin/decryptcore/ |
H A D | decryptcore.c | 310 const char *crashdir, *dumpnr, *privatekey; in main() local 327 privatekey = NULL; in main() 360 privatekey = optarg; in main() 400 if (privatekey == NULL || *keyfile == '\0' || *encryptedcore == '\0' || in main() 419 if (!decrypt(ofd, privatekey, keyfile, encryptedcore)) { in main()
|
/freebsd/crypto/openssh/ |
H A D | PROTOCOL.key | 32 The list of privatekey/comment pairs is padded with the
|
/freebsd/crypto/openssl/ssl/statem/ |
H A D | statem_srvr.c | 2658 EVP_PKEY *pkey = s->s3.tmp.cert->privatekey; in tls_construct_server_key_exchange() 2867 rsa = s->cert->pkeys[SSL_PKEY_RSA].privatekey; in tls_process_cke_rsa() 3119 pk = s->cert->pkeys[SSL_PKEY_GOST12_512].privatekey; in tls_process_cke_gost() 3121 pk = s->cert->pkeys[SSL_PKEY_GOST12_256].privatekey; in tls_process_cke_gost() 3124 pk = s->cert->pkeys[SSL_PKEY_GOST01].privatekey; in tls_process_cke_gost() 3127 pk = s->cert->pkeys[SSL_PKEY_GOST01].privatekey; in tls_process_cke_gost() 3226 pk = s->cert->pkeys[SSL_PKEY_GOST12_512].privatekey != NULL ? in tls_process_cke_gost18() 3227 s->cert->pkeys[SSL_PKEY_GOST12_512].privatekey : in tls_process_cke_gost18() 3228 s->cert->pkeys[SSL_PKEY_GOST12_256].privatekey; in tls_process_cke_gost18()
|
H A D | statem_lib.c | 289 pkey = s->s3.tmp.cert->privatekey; in tls_construct_cert_verify() 1568 curve = ssl_get_EC_curve_nid(s->cert->pkeys[SSL_PKEY_ECC].privatekey); in is_tls13_capable()
|
/freebsd/crypto/openssl/doc/man1/ |
H A D | openssl-dgst.pod.in | 228 openssl dgst -sha256 -sign privatekey.pem -out signature.sign file.txt 230 openssl sha256 -sign privatekey.pem -out signature.sign file.txt
|
/freebsd/crypto/openssl/include/openssl/ |
H A D | ssl.h | 1671 __owur int SSL_use_cert_and_key(SSL *ssl, X509 *x509, EVP_PKEY *privatekey, 1821 __owur int SSL_CTX_use_cert_and_key(SSL_CTX *ctx, X509 *x509, EVP_PKEY *privatekey,
|
H A D | ssl.h.in | 1599 __owur int SSL_use_cert_and_key(SSL *ssl, X509 *x509, EVP_PKEY *privatekey, 1749 __owur int SSL_CTX_use_cert_and_key(SSL_CTX *ctx, X509 *x509, EVP_PKEY *privatekey,
|
/freebsd/contrib/ntp/util/ |
H A D | invoke-ntp-keygen.texi | 1066 -C Str cipher privatekey cipher 1151 This is the ``privatekey cipher'' option.
|
H A D | ntp-keygen-opts.def | 54 descrip = "privatekey cipher";
|
/freebsd/contrib/wpa/wpa_supplicant/ |
H A D | ChangeLog | 2521 client_cert, privatekey, private_key_passwd
|