Home
last modified time | relevance | path

Searched refs:privatekey (Results 1 – 17 of 17) sorted by relevance

/freebsd/crypto/openssl/ssl/
H A Dssl_rsa.c148 EVP_PKEY_free(c->pkeys[i].privatekey); in ssl_set_pkey()
149 c->pkeys[i].privatekey = pkey; in ssl_set_pkey()
279 if (c->pkeys[i].privatekey != NULL) { in ssl_set_cert()
285 EVP_PKEY_copy_parameters(pkey, c->pkeys[i].privatekey); in ssl_set_cert()
288 if (!X509_check_private_key(x, c->pkeys[i].privatekey)) { in ssl_set_cert()
294 EVP_PKEY_free(c->pkeys[i].privatekey); in ssl_set_cert()
295 c->pkeys[i].privatekey = NULL; in ssl_set_cert()
979 static int ssl_set_cert_and_key(SSL *ssl, SSL_CTX *ctx, X509 *x509, EVP_PKEY *privatekey, in ssl_set_cert_and_key() argument
1012 if (privatekey == NULL) { in ssl_set_cert_and_key()
1013 privatekey = pubkey; in ssl_set_cert_and_key()
[all …]
H A Dssl_cert.c139 if (cpk->privatekey != NULL) { in ssl_cert_dup()
140 if (!EVP_PKEY_up_ref(cpk->privatekey)) in ssl_cert_dup()
142 rpk->privatekey = cpk->privatekey; in ssl_cert_dup()
253 EVP_PKEY_free(cpk->privatekey); in ssl_cert_clear_certs()
254 cpk->privatekey = NULL; in ssl_cert_clear_certs()
374 if (cpk->x509 == x && cpk->privatekey) { in ssl_cert_select_current()
382 if (cpk->privatekey && cpk->x509 && !X509_cmp(cpk->x509, x)) { in ssl_cert_select_current()
406 if (cpk->x509 && cpk->privatekey) { in ssl_cert_set_current()
H A Dt1_lib.c2463 if (s->cert->pkeys[real_idx].privatekey != NULL) { in tls1_get_legacy_sigalg()
2478 if (s->cert->pkeys[real_idx].privatekey != NULL) { in tls1_get_legacy_sigalg()
4017 pk = cpk->privatekey; in tls1_check_chain()
4297 dh_secbits = EVP_PKEY_get_security_bits(s->s3.tmp.cert->privatekey); in ssl_get_auto_dh()
4535 s->cert->pkeys[idx].privatekey); in has_usable_cert()
4590 : s->cert->pkeys[lu->sig_idx].privatekey; in find_sig_alg()
4655 .privatekey); in tls_choose_sigalg()
4681 EVP_PKEY *pkey = s->cert->pkeys[sig_idx].privatekey; in tls_choose_sigalg()
H A Dssl_local.h2009 EVP_PKEY *privatekey; member
2479 && sc->cert->pkeys[idx].privatekey != NULL in tls12_rpk_and_privkey()
2510 return s->cert->pkeys[idx].privatekey != NULL; in ssl_has_cert()
2513 && s->cert->pkeys[idx].privatekey != NULL; in ssl_has_cert()
H A Dssl_lib.c2064 if (ctx->cert->key->privatekey == NULL) { in SSL_CTX_check_private_key()
2068 return X509_check_private_key(ctx->cert->key->x509, ctx->cert->key->privatekey); in SSL_CTX_check_private_key()
2084 if (sc->cert->key->privatekey == NULL) { in SSL_check_private_key()
2089 sc->cert->key->privatekey); in SSL_check_private_key()
5259 return sc->cert->key->privatekey; in SSL_get_privatekey()
5275 return ctx->cert->key->privatekey; in SSL_CTX_get0_privatekey()
H A Dssl_conf.c1081 if (p != NULL && c->pkeys[i].privatekey == NULL) { in SSL_CONF_CTX_finish()
/freebsd/sbin/decryptcore/
H A Ddecryptcore.c310 const char *crashdir, *dumpnr, *privatekey; in main() local
327 privatekey = NULL; in main()
360 privatekey = optarg; in main()
400 if (privatekey == NULL || *keyfile == '\0' || *encryptedcore == '\0' || in main()
419 if (!decrypt(ofd, privatekey, keyfile, encryptedcore)) { in main()
/freebsd/crypto/openssh/
H A DPROTOCOL.key32 The list of privatekey/comment pairs is padded with the
/freebsd/crypto/openssl/ssl/statem/
H A Dstatem_srvr.c2792 EVP_PKEY *pkey = s->s3.tmp.cert->privatekey; in tls_construct_server_key_exchange()
3006 rsa = s->cert->pkeys[SSL_PKEY_RSA].privatekey; in tls_process_cke_rsa()
3259 pk = s->cert->pkeys[SSL_PKEY_GOST12_512].privatekey; in tls_process_cke_gost()
3261 pk = s->cert->pkeys[SSL_PKEY_GOST12_256].privatekey; in tls_process_cke_gost()
3264 pk = s->cert->pkeys[SSL_PKEY_GOST01].privatekey; in tls_process_cke_gost()
3267 pk = s->cert->pkeys[SSL_PKEY_GOST01].privatekey; in tls_process_cke_gost()
3368 …_PKEY_GOST12_512].privatekey != NULL ? s->cert->pkeys[SSL_PKEY_GOST12_512].privatekey : s->cert->p… in tls_process_cke_gost18()
H A Dstatem_lib.c330 pkey = s->s3.tmp.cert->privatekey; in tls_construct_cert_verify()
1344 } else if (cpk != NULL && cpk->privatekey != NULL) { in tls_output_rpk()
1346 pdata_len = i2d_PUBKEY(cpk->privatekey, &pdata); in tls_output_rpk()
1969 curve = ssl_get_EC_curve_nid(s->cert->pkeys[SSL_PKEY_ECC].privatekey); in is_tls13_capable()
/freebsd/crypto/openssl/doc/man1/
H A Dopenssl-dgst.pod.in235 openssl dgst -sha256 -sign privatekey.pem -out signature.sign file.txt
237 openssl sha256 -sign privatekey.pem -out signature.sign file.txt
H A Dopenssl-req.pod.in664 openssl req -newkey rsa:2048 -keyout privatekey.pem -out request.csr -cipher aes-256-cbc
/freebsd/crypto/openssl/include/openssl/
H A Dssl.h1695 __owur int SSL_use_cert_and_key(SSL *ssl, X509 *x509, EVP_PKEY *privatekey,
1855 __owur int SSL_CTX_use_cert_and_key(SSL_CTX *ctx, X509 *x509, EVP_PKEY *privatekey,
H A Dssl.h.in1648 __owur int SSL_use_cert_and_key(SSL *ssl, X509 *x509, EVP_PKEY *privatekey,
1808 __owur int SSL_CTX_use_cert_and_key(SSL_CTX *ctx, X509 *x509, EVP_PKEY *privatekey,
/freebsd/contrib/ntp/util/
H A Dinvoke-ntp-keygen.texi1066 -C Str cipher privatekey cipher
1151 This is the ``privatekey cipher'' option.
H A Dntp-keygen-opts.def54 descrip = "privatekey cipher";
/freebsd/contrib/wpa/wpa_supplicant/
H A DChangeLog2521 client_cert, privatekey, private_key_passwd