| /freebsd/crypto/openssl/ssl/ |
| H A D | ssl_rsa.c | 148 EVP_PKEY_free(c->pkeys[i].privatekey); in ssl_set_pkey() 149 c->pkeys[i].privatekey = pkey; in ssl_set_pkey() 279 if (c->pkeys[i].privatekey != NULL) { in ssl_set_cert() 285 EVP_PKEY_copy_parameters(pkey, c->pkeys[i].privatekey); in ssl_set_cert() 288 if (!X509_check_private_key(x, c->pkeys[i].privatekey)) { in ssl_set_cert() 294 EVP_PKEY_free(c->pkeys[i].privatekey); in ssl_set_cert() 295 c->pkeys[i].privatekey = NULL; in ssl_set_cert() 979 static int ssl_set_cert_and_key(SSL *ssl, SSL_CTX *ctx, X509 *x509, EVP_PKEY *privatekey, in ssl_set_cert_and_key() argument 1012 if (privatekey == NULL) { in ssl_set_cert_and_key() 1013 privatekey = pubkey; in ssl_set_cert_and_key() [all …]
|
| H A D | ssl_cert.c | 139 if (cpk->privatekey != NULL) { in ssl_cert_dup() 140 if (!EVP_PKEY_up_ref(cpk->privatekey)) in ssl_cert_dup() 142 rpk->privatekey = cpk->privatekey; in ssl_cert_dup() 253 EVP_PKEY_free(cpk->privatekey); in ssl_cert_clear_certs() 254 cpk->privatekey = NULL; in ssl_cert_clear_certs() 374 if (cpk->x509 == x && cpk->privatekey) { in ssl_cert_select_current() 382 if (cpk->privatekey && cpk->x509 && !X509_cmp(cpk->x509, x)) { in ssl_cert_select_current() 406 if (cpk->x509 && cpk->privatekey) { in ssl_cert_set_current()
|
| H A D | t1_lib.c | 2463 if (s->cert->pkeys[real_idx].privatekey != NULL) { in tls1_get_legacy_sigalg() 2478 if (s->cert->pkeys[real_idx].privatekey != NULL) { in tls1_get_legacy_sigalg() 4017 pk = cpk->privatekey; in tls1_check_chain() 4297 dh_secbits = EVP_PKEY_get_security_bits(s->s3.tmp.cert->privatekey); in ssl_get_auto_dh() 4535 s->cert->pkeys[idx].privatekey); in has_usable_cert() 4590 : s->cert->pkeys[lu->sig_idx].privatekey; in find_sig_alg() 4655 .privatekey); in tls_choose_sigalg() 4681 EVP_PKEY *pkey = s->cert->pkeys[sig_idx].privatekey; in tls_choose_sigalg()
|
| H A D | ssl_local.h | 2009 EVP_PKEY *privatekey; member 2479 && sc->cert->pkeys[idx].privatekey != NULL in tls12_rpk_and_privkey() 2510 return s->cert->pkeys[idx].privatekey != NULL; in ssl_has_cert() 2513 && s->cert->pkeys[idx].privatekey != NULL; in ssl_has_cert()
|
| H A D | ssl_lib.c | 2064 if (ctx->cert->key->privatekey == NULL) { in SSL_CTX_check_private_key() 2068 return X509_check_private_key(ctx->cert->key->x509, ctx->cert->key->privatekey); in SSL_CTX_check_private_key() 2084 if (sc->cert->key->privatekey == NULL) { in SSL_check_private_key() 2089 sc->cert->key->privatekey); in SSL_check_private_key() 5259 return sc->cert->key->privatekey; in SSL_get_privatekey() 5275 return ctx->cert->key->privatekey; in SSL_CTX_get0_privatekey()
|
| H A D | ssl_conf.c | 1081 if (p != NULL && c->pkeys[i].privatekey == NULL) { in SSL_CONF_CTX_finish()
|
| /freebsd/sbin/decryptcore/ |
| H A D | decryptcore.c | 310 const char *crashdir, *dumpnr, *privatekey; in main() local 327 privatekey = NULL; in main() 360 privatekey = optarg; in main() 400 if (privatekey == NULL || *keyfile == '\0' || *encryptedcore == '\0' || in main() 419 if (!decrypt(ofd, privatekey, keyfile, encryptedcore)) { in main()
|
| /freebsd/crypto/openssh/ |
| H A D | PROTOCOL.key | 32 The list of privatekey/comment pairs is padded with the
|
| /freebsd/crypto/openssl/ssl/statem/ |
| H A D | statem_srvr.c | 2792 EVP_PKEY *pkey = s->s3.tmp.cert->privatekey; in tls_construct_server_key_exchange() 3006 rsa = s->cert->pkeys[SSL_PKEY_RSA].privatekey; in tls_process_cke_rsa() 3259 pk = s->cert->pkeys[SSL_PKEY_GOST12_512].privatekey; in tls_process_cke_gost() 3261 pk = s->cert->pkeys[SSL_PKEY_GOST12_256].privatekey; in tls_process_cke_gost() 3264 pk = s->cert->pkeys[SSL_PKEY_GOST01].privatekey; in tls_process_cke_gost() 3267 pk = s->cert->pkeys[SSL_PKEY_GOST01].privatekey; in tls_process_cke_gost() 3368 …_PKEY_GOST12_512].privatekey != NULL ? s->cert->pkeys[SSL_PKEY_GOST12_512].privatekey : s->cert->p… in tls_process_cke_gost18()
|
| H A D | statem_lib.c | 330 pkey = s->s3.tmp.cert->privatekey; in tls_construct_cert_verify() 1344 } else if (cpk != NULL && cpk->privatekey != NULL) { in tls_output_rpk() 1346 pdata_len = i2d_PUBKEY(cpk->privatekey, &pdata); in tls_output_rpk() 1969 curve = ssl_get_EC_curve_nid(s->cert->pkeys[SSL_PKEY_ECC].privatekey); in is_tls13_capable()
|
| /freebsd/crypto/openssl/doc/man1/ |
| H A D | openssl-dgst.pod.in | 235 openssl dgst -sha256 -sign privatekey.pem -out signature.sign file.txt 237 openssl sha256 -sign privatekey.pem -out signature.sign file.txt
|
| H A D | openssl-req.pod.in | 664 openssl req -newkey rsa:2048 -keyout privatekey.pem -out request.csr -cipher aes-256-cbc
|
| /freebsd/crypto/openssl/include/openssl/ |
| H A D | ssl.h | 1695 __owur int SSL_use_cert_and_key(SSL *ssl, X509 *x509, EVP_PKEY *privatekey, 1855 __owur int SSL_CTX_use_cert_and_key(SSL_CTX *ctx, X509 *x509, EVP_PKEY *privatekey,
|
| H A D | ssl.h.in | 1648 __owur int SSL_use_cert_and_key(SSL *ssl, X509 *x509, EVP_PKEY *privatekey, 1808 __owur int SSL_CTX_use_cert_and_key(SSL_CTX *ctx, X509 *x509, EVP_PKEY *privatekey,
|
| /freebsd/contrib/ntp/util/ |
| H A D | invoke-ntp-keygen.texi | 1066 -C Str cipher privatekey cipher 1151 This is the ``privatekey cipher'' option.
|
| H A D | ntp-keygen-opts.def | 54 descrip = "privatekey cipher";
|
| /freebsd/contrib/wpa/wpa_supplicant/ |
| H A D | ChangeLog | 2521 client_cert, privatekey, private_key_passwd
|