Home
last modified time | relevance | path

Searched refs:privatekey (Results 1 – 16 of 16) sorted by relevance

/freebsd/crypto/openssl/ssl/
H A Dssl_rsa.c131 EVP_PKEY_free(c->pkeys[i].privatekey); in ssl_set_pkey()
133 c->pkeys[i].privatekey = pkey; in ssl_set_pkey()
248 if (c->pkeys[i].privatekey != NULL) { in ssl_set_cert()
253 EVP_PKEY_copy_parameters(pkey, c->pkeys[i].privatekey); in ssl_set_cert()
256 if (!X509_check_private_key(x, c->pkeys[i].privatekey)) { in ssl_set_cert()
262 EVP_PKEY_free(c->pkeys[i].privatekey); in ssl_set_cert()
263 c->pkeys[i].privatekey = NULL; in ssl_set_cert()
923 static int ssl_set_cert_and_key(SSL *ssl, SSL_CTX *ctx, X509 *x509, EVP_PKEY *privatekey, in ssl_set_cert_and_key() argument
951 if (privatekey == NULL) { in ssl_set_cert_and_key()
952 privatekey = pubkey; in ssl_set_cert_and_key()
[all …]
H A Dssl_cert.c120 if (cpk->privatekey != NULL) { in ssl_cert_dup()
121 rpk->privatekey = cpk->privatekey; in ssl_cert_dup()
122 EVP_PKEY_up_ref(cpk->privatekey); in ssl_cert_dup()
223 EVP_PKEY_free(cpk->privatekey); in ssl_cert_clear_certs()
224 cpk->privatekey = NULL; in ssl_cert_clear_certs()
330 if (cpk->x509 == x && cpk->privatekey) { in ssl_cert_select_current()
338 if (cpk->privatekey && cpk->x509 && !X509_cmp(cpk->x509, x)) { in ssl_cert_select_current()
361 if (cpk->x509 && cpk->privatekey) { in ssl_cert_set_current()
H A Dt1_lib.c1314 if (s->cert->pkeys[real_idx].privatekey != NULL) { in tls1_get_legacy_sigalg()
1329 if (s->cert->pkeys[real_idx].privatekey != NULL) { in tls1_get_legacy_sigalg()
2670 pk = cpk->privatekey; in tls1_check_chain()
2934 dh_secbits = EVP_PKEY_get_security_bits(s->s3.tmp.cert->privatekey); in ssl_get_auto_dh()
3156 s->cert->pkeys[idx].privatekey); in has_usable_cert()
3208 : s->cert->pkeys[lu->sig_idx].privatekey; in find_sig_alg()
3272 .privatekey); in tls_choose_sigalg()
3296 EVP_PKEY *pkey = s->cert->pkeys[sig_idx].privatekey; in tls_choose_sigalg()
H A Dssl_lib.c1672 if (ctx->cert->key->privatekey == NULL) { in SSL_CTX_check_private_key()
1677 (ctx->cert->key->x509, ctx->cert->key->privatekey); in SSL_CTX_check_private_key()
1691 if (ssl->cert->key->privatekey == NULL) { in SSL_check_private_key()
1696 ssl->cert->key->privatekey); in SSL_check_private_key()
4222 return s->cert->key->privatekey; in SSL_get_privatekey()
4238 return ctx->cert->key->privatekey; in SSL_CTX_get0_privatekey()
H A Dssl_conf.c994 if (p && !c->pkeys[i].privatekey) { in SSL_CONF_CTX_finish()
H A Dssl_local.h1943 EVP_PKEY *privatekey; member
2366 && s->cert->pkeys[idx].privatekey != NULL; in ssl_has_cert()
/freebsd/sbin/decryptcore/
H A Ddecryptcore.c310 const char *crashdir, *dumpnr, *privatekey; in main() local
327 privatekey = NULL; in main()
360 privatekey = optarg; in main()
400 if (privatekey == NULL || *keyfile == '\0' || *encryptedcore == '\0' || in main()
419 if (!decrypt(ofd, privatekey, keyfile, encryptedcore)) { in main()
/freebsd/crypto/openssh/
H A DPROTOCOL.key32 The list of privatekey/comment pairs is padded with the
/freebsd/crypto/openssl/ssl/statem/
H A Dstatem_srvr.c2658 EVP_PKEY *pkey = s->s3.tmp.cert->privatekey; in tls_construct_server_key_exchange()
2867 rsa = s->cert->pkeys[SSL_PKEY_RSA].privatekey; in tls_process_cke_rsa()
3119 pk = s->cert->pkeys[SSL_PKEY_GOST12_512].privatekey; in tls_process_cke_gost()
3121 pk = s->cert->pkeys[SSL_PKEY_GOST12_256].privatekey; in tls_process_cke_gost()
3124 pk = s->cert->pkeys[SSL_PKEY_GOST01].privatekey; in tls_process_cke_gost()
3127 pk = s->cert->pkeys[SSL_PKEY_GOST01].privatekey; in tls_process_cke_gost()
3226 pk = s->cert->pkeys[SSL_PKEY_GOST12_512].privatekey != NULL ? in tls_process_cke_gost18()
3227 s->cert->pkeys[SSL_PKEY_GOST12_512].privatekey : in tls_process_cke_gost18()
3228 s->cert->pkeys[SSL_PKEY_GOST12_256].privatekey; in tls_process_cke_gost18()
H A Dstatem_lib.c289 pkey = s->s3.tmp.cert->privatekey; in tls_construct_cert_verify()
1568 curve = ssl_get_EC_curve_nid(s->cert->pkeys[SSL_PKEY_ECC].privatekey); in is_tls13_capable()
/freebsd/crypto/openssl/doc/man1/
H A Dopenssl-dgst.pod.in228 openssl dgst -sha256 -sign privatekey.pem -out signature.sign file.txt
230 openssl sha256 -sign privatekey.pem -out signature.sign file.txt
/freebsd/crypto/openssl/include/openssl/
H A Dssl.h1671 __owur int SSL_use_cert_and_key(SSL *ssl, X509 *x509, EVP_PKEY *privatekey,
1821 __owur int SSL_CTX_use_cert_and_key(SSL_CTX *ctx, X509 *x509, EVP_PKEY *privatekey,
H A Dssl.h.in1599 __owur int SSL_use_cert_and_key(SSL *ssl, X509 *x509, EVP_PKEY *privatekey,
1749 __owur int SSL_CTX_use_cert_and_key(SSL_CTX *ctx, X509 *x509, EVP_PKEY *privatekey,
/freebsd/contrib/ntp/util/
H A Dinvoke-ntp-keygen.texi1066 -C Str cipher privatekey cipher
1151 This is the ``privatekey cipher'' option.
H A Dntp-keygen-opts.def54 descrip = "privatekey cipher";
/freebsd/contrib/wpa/wpa_supplicant/
H A DChangeLog2521 client_cert, privatekey, private_key_passwd