/openssl-master/crypto/asn1/ |
A D | d2i_pr.c | 168 STACK_OF(ASN1_TYPE) *inkey; in d2i_AutoPrivateKey_legacy() 178 inkey = d2i_ASN1_SEQUENCE_ANY(NULL, &p, length); in d2i_AutoPrivateKey_legacy() 184 if (sk_ASN1_TYPE_num(inkey) == 6) { in d2i_AutoPrivateKey_legacy() 186 } else if (sk_ASN1_TYPE_num(inkey) == 4) { in d2i_AutoPrivateKey_legacy() 188 } else if (sk_ASN1_TYPE_num(inkey) == 3) { /* This seems to be PKCS8, not in d2i_AutoPrivateKey_legacy() 193 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free); in d2i_AutoPrivateKey_legacy() 210 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free); in d2i_AutoPrivateKey_legacy()
|
/openssl-master/apps/ |
A D | ts.c | 50 const char *queryfile, const char *passin, const char *inkey, 57 const char *inkey, const EVP_MD *md, const char *signer, 169 char *inkey = NULL, *signer = NULL, *chain = NULL, *CApath = NULL; in ts_main() local 256 inkey = opt_arg(); in ts_main() 331 password, inkey, md, signer, chain, policy, in ts_main() 585 const char *queryfile, const char *passin, const char *inkey, in reply_command() argument 608 passin, inkey, md, signer, chain, policy); in reply_command() 694 const char *inkey, const EVP_MD *md, const char *signer, in create_response() argument 718 if (!TS_CONF_set_signer_key(conf, section, inkey, passin, resp_ctx)) in create_response()
|
A D | pkeyutl.c | 120 const char *inkey = NULL; in pkeyutl_main() local 157 inkey = opt_arg(); in pkeyutl_main() 289 } else if (inkey == NULL) { in pkeyutl_main() 305 ctx = init_ctx(kdfalg, &keysize, inkey, keyform, key_type, in pkeyutl_main()
|
/openssl-master/doc/man1/ |
A D | openssl-rsautl.pod.in | 16 [B<-inkey> I<filename>|I<uri>] 68 =item B<-inkey> I<filename>|I<uri> 137 openssl rsautl -sign -in file -inkey key.pem -out sig 141 openssl rsautl -verify -in sig -inkey key.pem 145 openssl rsautl -verify -in sig -inkey key.pem -raw -hexdump 197 openssl rsautl -in sig -verify -asn1parse -inkey pubkey.pem -pubin
|
A D | openssl-pkeyutl.pod.in | 17 [B<-inkey> I<filename>|I<uri>] 86 =item B<-inkey> I<filename>|I<uri> 355 openssl pkeyutl -sign -in file -inkey key.pem -out sig 359 openssl pkeyutl -verifyrecover -in sig -inkey key.pem 363 openssl pkeyutl -verify -in file -sigfile sig -inkey key.pem 367 openssl pkeyutl -sign -in file -inkey key.pem -out sig -pkeyopt digest:sha256 371 openssl pkeyutl -derive -inkey key.pem -peerkey pubkey.pem -out secret 391 openssl pkeyutl -sign -in file -inkey sm2.key -out sig -rawin -digest sm3 \ 396 openssl pkeyutl -verify -certin -in file -inkey sm2.cert -sigfile sig \ 401 openssl pkeyutl -decrypt -in file -inkey key.pem -out secret \
|
A D | openssl-smime.pod.in | 37 [B<-inkey> I<filename>|I<uri>] 259 =item B<-inkey> I<filename>|I<uri> 386 -signer mycert.pem -inkey mykey.pem -certfile mycerts.pem 421 openssl smime -decrypt -in mail.msg -recip mycert.pem -inkey key.pem
|
A D | openssl-pkcs12.pod.in | 49 [B<-inkey> I<filename>|I<uri>] 250 =item B<-inkey> I<filename>|I<uri> 448 openssl pkcs12 -export -in cert.pem -inkey key.pem -out file.p12 -legacy
|
A D | openssl-ts.pod.in | 35 [B<-inkey> I<filename>|I<uri>] 238 =item B<-inkey> I<filename>|I<uri> 428 The private key of the TSA in PEM format. The same as the B<-inkey> 546 openssl ts -reply -queryfile design1.tsq -inkey tsakey.pem \
|
A D | openssl-cms.pod.in | 55 [B<-inkey> I<filename>|I<uri>] 337 =item B<-inkey> I<filename>|I<uri> 781 -signer mycert.pem -inkey mykey.pem -certfile mycerts.pem 816 openssl cms -decrypt -in mail.msg -recip mycert.pem -inkey key.pem
|
/openssl-master/providers/implementations/ciphers/ |
A D | cipher_aes_cbc_hmac_sha.h | 18 void (*init_mac_key)(void *ctx, const unsigned char *inkey, size_t inlen);
|
/openssl-master/crypto/evp/ |
A D | e_rc4_hmac_md5.c | 45 const unsigned char *inkey, in rc4_hmac_md5_init_key() argument 54 RC4_set_key(&key->ks, keylen, inkey); in rc4_hmac_md5_init_key()
|
A D | e_chacha20_poly1305.c | 168 const unsigned char *inkey, in chacha20_poly1305_init_key() argument 173 if (!inkey && !iv) in chacha20_poly1305_init_key() 190 chacha_init_key(ctx, inkey, temp, enc); in chacha20_poly1305_init_key() 196 chacha_init_key(ctx, inkey, NULL, enc); in chacha20_poly1305_init_key()
|
A D | e_aes_cbc_hmac_sha1.c | 70 const unsigned char *inkey, in aesni_cbc_hmac_sha1_init_key() argument 77 ret = aesni_set_encrypt_key(inkey, in aesni_cbc_hmac_sha1_init_key() 81 ret = aesni_set_decrypt_key(inkey, in aesni_cbc_hmac_sha1_init_key()
|
A D | e_aes_cbc_hmac_sha256.c | 66 const unsigned char *inkey, in aesni_cbc_hmac_sha256_init_key() argument 73 ret = aesni_set_encrypt_key(inkey, in aesni_cbc_hmac_sha256_init_key() 77 ret = aesni_set_decrypt_key(inkey, in aesni_cbc_hmac_sha256_init_key()
|
/openssl-master/engines/ |
A D | e_ossltest.c | 785 const unsigned char *inkey, in ossltest_aes128_cbc_hmac_sha1_init_key() argument
|