/openssl/test/ |
H A D | drbgtest.c | 303 result = l->private - r->private; in compare_drbg_fork_result() 360 result[0].private = 0; in test_drbg_reseed_in_child() 365 result[1].private = 1; in test_drbg_reseed_in_child() 445 result[0].private = 0; in test_rand_reseed_on_fork() 450 result[1].private = 1; in test_rand_reseed_on_fork() 467 ++duplicate[result[i].private]; in test_rand_reseed_on_fork() 523 EVP_RAND_CTX *primary, *public, *private; in test_rand_fork_safety() local 571 if (!TEST_ptr_ne(public, private) in test_rand_reseed() 573 || !TEST_ptr_ne(private, primary) in test_rand_reseed() 584 EVP_RAND_uninstantiate(private); in test_rand_reseed() [all …]
|
/openssl/doc/man3/ |
H A D | SSL_CTX_use_certificate.pod | 92 SSL_CTX_use_RSAPrivateKey() adds the private key B<rsa> of type RSA 98 SSL_CTX_use_certificate() before setting the private key with 114 private key being assigned via SSL_CTX_use_PrivateKey(), etc. 116 SSL_CTX_use_PrivateKey_ASN1() adds the private key of type B<pk> 118 SSL_CTX_use_RSAPrivateKey_ASN1() adds the private key of type RSA 123 SSL_CTX_use_PrivateKey_file() adds the first private key found in 141 The internal certificate store of OpenSSL can hold several private 145 When reading certificates and private keys from file, files of type 147 one certificate or private key, consequently 177 functions to set a new private key will replace any private key that has already [all …]
|
H A D | EVP_PKEY_new.pod | 18 - public/private key allocation and raw key handling functions 68 Conceptually, an B<EVP_PKEY> internal key may hold a private key, a public 74 =for comment ED signature require both the private and public key... 97 string for a public key algorithm that supports raw private keys, i.e one of 98 "X25519", "ED25519", "X448" or "ED448". I<key> points to the raw private key 109 algorithm that supports raw private keys, i.e. one of B<EVP_PKEY_X25519>, 121 private key information. Algorithm types that support raw public keys are 126 data. The B<EVP_PKEY> structure will be initialised without any private key 155 raw private key data, it also takes a cipher algorithm to be used during 166 general private key without reference to any particular algorithm. [all …]
|
H A D | EVP_PKEY2PKCS8.pod | 6 - Convert a private key to/from PKCS8 19 EVP_PKEY2PKCS8() converts a private key I<pkey> into a returned PKCS8 object. 21 EVP_PKCS82PKEY_ex() converts a PKCS8 object I<p8> into a returned private key. 30 EVP_PKCS82PKEY() and EVP_PKCS82PKEY_ex() return a private key on success.
|
H A D | EVP_PKEY_decapsulate.pod | 6 - Key decapsulation using a KEM algorithm with a private key 21 The EVP_PKEY_decapsulate_init() function initializes a private key algorithm 25 specifying the private key to use. 31 The EVP_PKEY_decapsulate() function performs a private key decapsulation 52 supported by the private key algorithm. 61 * NB: assumes rsa_priv_key is an RSA private key,
|
H A D | PKCS12_parse.pod | 19 If successful the private key will be written to B<*pkey>, the corresponding 25 the private key, the corresponding certificate, or the additional certificates, 54 Only a single private key and corresponding certificate is returned by this 55 function. More complex PKCS#12 files with multiple private keys will only 61 Attributes currently cannot be stored in the private key B<EVP_PKEY> structure.
|
H A D | DSA_get0_pqg.pod | 42 public key (B<pub_key>) and (optionally) a private key (B<priv_key>). 56 To get the public and private key values use the DSA_get0_key() function. A 58 private key will be stored in B<*priv_key>. Either may be NULL if they have not 59 been set yet, although if the private key has been set then the public key must 61 private key values. This memory should not be freed directly. 63 The public and private key values can be set using DSA_set0_key(). The public 65 object. The private key may be NULL. On subsequent calls, either may be NULL,
|
/openssl/doc/man1/ |
H A D | openssl-pkcs8.pod.in | 6 openssl-pkcs8 - PKCS#8 format private key conversion command 36 This command processes private keys in PKCS#8 format. It can handle 50 Normally a PKCS#8 private key is expected on input and a private key will be 52 reversed: it reads a private key and writes a PKCS#8 format key. 65 used then a traditional format private key is written instead. 68 unencrypted private key in traditional DER format. 120 code signing software used unencrypted private keys. 222 Convert a private key to PKCS#8 unencrypted format: 226 Convert a private key to PKCS#5 v2.0 format using triple DES: 245 Read a DER unencrypted PKCS#8 format private key: [all …]
|
H A D | openssl-pkey.pod.in | 10 openssl-pkey - public or private key processing command 37 This command processes public or private keys. They can be 56 This option checks the consistency of a key pair for both public and private 92 By default a private key is read from the input. 140 By default the private and public key is output; 189 To remove the pass phrase on a private key: 193 To encrypt a private key using triple DES: 197 To convert a private key from PEM to DER format: 201 To print out the components of a private key to standard output: 205 To print out the public components of a private key to standard output: [all …]
|
H A D | openssl-ec.pod.in | 40 private key format specified in 'SEC 1: Elliptic Curve Cryptography' 41 (http://www.secg.org/). To convert an OpenSSL EC private key into the 42 PKCS#8 private key format use the L<openssl-pkcs8(1)> command. 62 Private keys are an SEC1 private key or PKCS#8 format. 97 Prints out the public, private key components and parameters. 109 By default a private key is read from the input. 115 By default a private key is output. With this option a public 161 To encrypt a private key using triple DES: 165 To convert a private key from PEM to DER format: 169 To print out the components of a private key to standard output: [all …]
|
H A D | openssl-rsa.pod.in | 73 When writing a private key, use the traditional PKCS#1 format 97 These options encrypt the private key with the specified 107 Prints out the various public or private key components in 120 This option checks the consistency of an RSA private key. 124 By default a private key is read from the input. 130 By default a private key is output: with this option a public 166 To remove the pass phrase on an RSA private key: 170 To encrypt a private key using triple DES: 174 To convert a private key from PEM to DER format: 178 To print out the components of a private key to standard output: [all …]
|
H A D | openssl-dsa.pod.in | 48 traditional SSLeay compatible format for private key encryption: newer 70 B<q>, B<g>, and the public and private key components. Public keys 96 These options encrypt the private key with the specified 106 Prints out the public, private key components and parameters. 118 By default, a private key is read from the input. 124 By default, a private key is output. With this option a public 154 To remove the pass phrase on a DSA private key: 158 To encrypt a private key using triple DES: 162 To convert a private key from PEM to DER format: 166 To print out the components of a private key to standard output: [all …]
|
H A D | openssl-pkcs12.pod.in | 128 No private keys will be output. 198 Use AES to encrypt private keys before outputting. 202 Use ARIA to encrypt private keys before outputting. 206 Use Camellia to encrypt private keys before outputting. 210 Use DES to encrypt private keys before outputting. 218 Use IDEA to encrypt private keys before outputting. 222 Don't encrypt private keys at all. 256 The private key input for PKCS12 output. 258 contain a private key. 416 the one corresponding to the private key. [all …]
|
H A D | openssl-genrsa.pod.in | 6 openssl-genrsa - generate an RSA private key 39 This command generates an RSA private key. 61 These options encrypt the private key with specified 99 The size of the private key to generate in bits. This must be the last option 106 RSA private key generation essentially involves the generation of two or more 107 prime numbers. When generating a private key various symbols will be output to
|
/openssl/apps/ |
H A D | pkey.c | 80 int private = 0, traditional = 0, check = 0, pub_check = 0; in pkey_main() local 191 private = (!noout && !pubout) || (text && !text_pub); in pkey_main() 218 out = bio_open_owner(outfile, outformat, private); in pkey_main() 275 assert(private); in pkey_main() 297 assert(private); in pkey_main() 311 assert(private); in pkey_main()
|
H A D | gendsa.c | 64 int ret = 1, private = 0, verbose = 0, nbits; in gendsa_main() local 119 private = 1; in gendsa_main() 128 out = bio_open_owner(outfile, FORMAT_PEM, private); in gendsa_main() 154 assert(private); in gendsa_main()
|
H A D | pkcs8.c | 92 int private = 0, traditional = 0; in pkcs8_main() local 209 private = 1; in pkcs8_main() 240 if ((out = bio_open_owner(outfile, outformat, private)) == NULL) in pkcs8_main() 243 assert(private); in pkcs8_main() 294 assert(private); in pkcs8_main() 362 assert(private); in pkcs8_main() 363 out = bio_open_owner(outfile, outformat, private); in pkcs8_main()
|
H A D | dsa.c | 89 int private = 0; in dsa_main() local 170 private = !pubin && (!pubout || text); in dsa_main() 193 out = bio_open_owner(outfile, outformat, private); in dsa_main() 198 assert(pubin || private); in dsa_main() 253 assert(private); in dsa_main()
|
H A D | ec.c | 77 int pubin = 0, pubout = 0, param_out = 0, ret = 1, private = 0; in ec_main() local 166 private = !pubin && (text || (!param_out && !pubout)); in ec_main() 185 out = bio_open_owner(outfile, outformat, private); in ec_main() 217 assert(pubin || private); in ec_main() 252 assert(private); in ec_main()
|
H A D | rsa.c | 131 int private = 0; in rsa_main() local 226 private = (text && !pubin) || (!pubout && !noout); in rsa_main() 263 out = bio_open_owner(outfile, outformat, private); in rsa_main() 268 assert(pubin || private); in rsa_main() 339 assert(private); in rsa_main() 352 assert(private); in rsa_main()
|
H A D | genpkey.c | 119 int private = 0, i; in genpkey_main() local 233 private = do_param ? 0 : 1; in genpkey_main() 240 out = bio_open_owner(outfile, outformat, private); in genpkey_main() 245 outpubkey = bio_open_owner(outpubkeyfile, outformat, private); in genpkey_main() 262 assert(private); in genpkey_main() 267 assert(private); in genpkey_main()
|
H A D | dsaparam.c | 73 int ret = 1, i, text = 0, private = 0; in dsaparam_main() local 151 private = genkey ? 1 : 0; in dsaparam_main() 199 out = bio_open_owner(outfile, outformat, private); in dsaparam_main() 237 assert(private); in dsaparam_main()
|
/openssl/doc/man7/ |
H A D | X25519.pod | 12 key derivation using B<X25519> and B<X448>. It has associated private and public 30 X25519 or X448 private keys can be set directly using 31 L<EVP_PKEY_new_raw_private_key(3)> or loaded from a PKCS#8 private key file 33 can also be generated (see the example below). Setting a private key also sets 42 This example generates an B<X25519> private key and writes it to standard
|
/openssl/doc/HOWTO/ |
H A D | certificates.txt | 27 public key. To be useful, there must be a corresponding private key 28 somewhere. With OpenSSL, public keys are easily derived from private 30 need to create a private key. 33 you want an RSA private key, or if you want a DSA private key: 36 The private keys created by these commands are not passphrase protected; 38 create private keys can be found at https://www.openssl.org/docs/HOWTO/keys.txt. 39 The rest of this text assumes you have a private key in the file privkey.pem. 106 By now, you have your certificate and your private key and can start
|
/openssl/crypto/rand/ |
H A D | rand_lib.c | 440 CRYPTO_THREAD_LOCAL private; member 476 if (!CRYPTO_THREAD_init_local(&dgbl->private, NULL)) in ossl_rand_ctx_new() 485 CRYPTO_THREAD_cleanup_local(&dgbl->private); in ossl_rand_ctx_new() 500 CRYPTO_THREAD_cleanup_local(&dgbl->private); in ossl_rand_ctx_free() 532 rand = CRYPTO_THREAD_get_local(&dgbl->private); in rand_delete_thread_state() 533 CRYPTO_THREAD_set_local(&dgbl->private, NULL); in rand_delete_thread_state() 825 if (CRYPTO_THREAD_get_local(&dgbl->private) == NULL in RAND_get0_public() 847 rand = CRYPTO_THREAD_get_local(&dgbl->private); in RAND_get0_private() 863 CRYPTO_THREAD_set_local(&dgbl->private, rand); in RAND_get0_private() 876 return CRYPTO_THREAD_get_local(&dgbl->private); in ossl_rand_get0_private_noncreating() [all …]
|