/openssl-master/demos/cms/ |
A D | cms_sign.c | 19 EVP_PKEY *skey = NULL; in main() local 43 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL); in main() 45 if (!scert || !skey) in main() 56 cms = CMS_sign(scert, skey, NULL, in, flags); in main() 83 EVP_PKEY_free(skey); in main()
|
A D | cms_sign2.c | 19 EVP_PKEY *skey = NULL, *skey2 = NULL; in main() local 35 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL); in main() 65 if (!CMS_add1_signer(cms, scert, skey, NULL, 0)) in main() 91 EVP_PKEY_free(skey); in main()
|
/openssl-master/demos/smime/ |
A D | smsign.c | 19 EVP_PKEY *skey = NULL; in main() local 43 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL); in main() 45 if (!scert || !skey) in main() 56 p7 = PKCS7_sign(scert, skey, NULL, in, flags); in main() 81 EVP_PKEY_free(skey); in main()
|
A D | smsign2.c | 19 EVP_PKEY *skey = NULL, *skey2 = NULL; in main() local 35 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL); in main() 65 if (!PKCS7_sign_add_signer(p7, scert, skey, NULL, 0)) in main() 89 EVP_PKEY_free(skey); in main()
|
/openssl-master/doc/man3/ |
A D | EVP_PKEY_derive.pod | 70 unsigned char *skey; 87 skey = OPENSSL_malloc(skeylen); 89 if (!skey) 92 if (EVP_PKEY_derive(ctx, skey, &skeylen) <= 0) 95 /* Shared secret is skey bytes written to buffer skey */
|
/openssl-master/demos/certs/apps/ |
A D | mkacerts.sh | 25 -key skey.pem -out sreq.pem -new 40 cat skey.pem >>server.pem
|
/openssl-master/demos/certs/ |
A D | mkcerts.sh | 19 -keyout skey.pem -out req.pem -newkey rsa:1024 58 -key skey.pem -out dhsreq.pem 69 -key skey.pem -out dhcreq.pem
|
/openssl-master/crypto/ocsp/ |
A D | ocsp_vfy.c | 78 EVP_PKEY *skey; in ocsp_verify() local 82 if ((skey = X509_get0_pubkey(signer)) == NULL) { in ocsp_verify() 87 ret = OCSP_REQUEST_verify(req, skey, signer->libctx, signer->propq); in ocsp_verify() 89 ret = OCSP_BASICRESP_verify(bs, skey, signer->libctx, signer->propq); in ocsp_verify()
|
/openssl-master/ssl/statem/ |
A D | extensions_clnt.c | 1736 EVP_PKEY *ckey = s->s3.tmp.pkey, *skey = NULL; in tls_parse_stoc_key_share() local 1830 skey = EVP_PKEY_new(); in tls_parse_stoc_key_share() 1831 if (skey == NULL || EVP_PKEY_copy_parameters(skey, ckey) <= 0) { in tls_parse_stoc_key_share() 1833 EVP_PKEY_free(skey); in tls_parse_stoc_key_share() 1837 if (EVP_PKEY_set1_encoded_public_key(skey, PACKET_data(&encoded_pt), in tls_parse_stoc_key_share() 1840 EVP_PKEY_free(skey); in tls_parse_stoc_key_share() 1844 if (ssl_derive(s, ckey, skey, 1) == 0) { in tls_parse_stoc_key_share() 1846 EVP_PKEY_free(skey); in tls_parse_stoc_key_share() 1849 s->s3.peer_tmp = skey; in tls_parse_stoc_key_share()
|
A D | extensions_srvr.c | 1584 EVP_PKEY *ckey = s->s3.peer_tmp, *skey = NULL; in tls_construct_stoc_key_share() local 1633 skey = ssl_generate_pkey(s, ckey); in tls_construct_stoc_key_share() 1634 if (skey == NULL) { in tls_construct_stoc_key_share() 1640 encoded_pt_len = EVP_PKEY_get1_encoded_public_key(skey, &encodedPoint); in tls_construct_stoc_key_share() 1643 EVP_PKEY_free(skey); in tls_construct_stoc_key_share() 1650 EVP_PKEY_free(skey); in tls_construct_stoc_key_share() 1659 s->s3.tmp.pkey = skey; in tls_construct_stoc_key_share() 1660 if (ssl_derive(s, skey, ckey, 1) == 0) { in tls_construct_stoc_key_share()
|
A D | statem_clnt.c | 2899 EVP_PKEY *ckey = NULL, *skey = NULL; in tls_construct_cke_dhe() local 2906 skey = s->s3.peer_tmp; in tls_construct_cke_dhe() 2907 if (skey == NULL) { in tls_construct_cke_dhe() 2912 ckey = ssl_generate_pkey(s, skey); in tls_construct_cke_dhe() 2918 if (ssl_derive(s, ckey, skey, 0) == 0) { in tls_construct_cke_dhe() 2929 EVP_PKEY_free(skey); in tls_construct_cke_dhe() 2964 EVP_PKEY *ckey = NULL, *skey = NULL; in tls_construct_cke_ecdhe() local 2967 skey = s->s3.peer_tmp; in tls_construct_cke_ecdhe() 2968 if (skey == NULL) { in tls_construct_cke_ecdhe() 2973 ckey = ssl_generate_pkey(s, skey); in tls_construct_cke_ecdhe() [all …]
|
A D | statem_srvr.c | 2957 EVP_PKEY *skey = NULL; in tls_process_cke_dhe() local 2967 skey = s->s3.tmp.pkey; in tls_process_cke_dhe() 2968 if (skey == NULL) { in tls_process_cke_dhe() 2983 if (ckey == NULL || EVP_PKEY_copy_parameters(ckey, skey) == 0) { in tls_process_cke_dhe() 2993 if (ssl_derive(s, skey, ckey, 1) == 0) { in tls_process_cke_dhe() 3008 EVP_PKEY *skey = s->s3.tmp.pkey; in tls_process_cke_ecdhe() local 3031 if (skey == NULL) { in tls_process_cke_ecdhe() 3037 if (ckey == NULL || EVP_PKEY_copy_parameters(ckey, skey) <= 0) { in tls_process_cke_ecdhe() 3048 if (ssl_derive(s, skey, ckey, 1) == 0) { in tls_process_cke_ecdhe()
|
/openssl-master/crypto/x509/ |
A D | x509_vfy.c | 2015 EVP_PKEY *skey, const EVP_MD *md, unsigned int flags) in X509_CRL_diff() argument 2052 if (skey != NULL && (X509_CRL_verify(base, skey) <= 0 || in X509_CRL_diff() 2053 X509_CRL_verify(newer, skey) <= 0)) { in X509_CRL_diff() 2108 if (skey != NULL && md != NULL && !X509_CRL_sign(crl, skey, md)) in X509_CRL_diff()
|
/openssl-master/test/ |
A D | sslapitest.c | 570 char *skey = test_mk_file_path(certsdir, "leaf.key"); in test_client_cert_verify_cb() local 586 || !TEST_int_eq(SSL_CTX_use_PrivateKey_file(sctx, skey, in test_client_cert_verify_cb() 637 OPENSSL_free(skey); in test_client_cert_verify_cb() 651 char *skey = test_mk_file_path(certsdir, "leaf.key"); in test_ssl_build_cert_chain() local 660 || !TEST_int_eq(SSL_use_PrivateKey_file(ssl, skey, SSL_FILETYPE_PEM), 1) in test_ssl_build_cert_chain() 671 OPENSSL_free(skey); in test_ssl_build_cert_chain() 679 char *skey = test_mk_file_path(certsdir, "leaf.key"); in test_ssl_ctx_build_cert_chain() local 686 || !TEST_int_eq(SSL_CTX_use_PrivateKey_file(ctx, skey, in test_ssl_ctx_build_cert_chain() 697 OPENSSL_free(skey); in test_ssl_ctx_build_cert_chain()
|
/openssl-master/include/openssl/ |
A D | x509.h.in | 757 EVP_PKEY *skey, const EVP_MD *md, unsigned int flags);
|