/openssl/test/ |
H A D | igetest.c | 231 AES_set_encrypt_key(rkey, 8 * sizeof(rkey), &key); in test_ige_enc_dec() 234 AES_set_decrypt_key(rkey, 8 * sizeof(rkey), &key); in test_ige_enc_dec() 248 AES_set_encrypt_key(rkey, 8 * sizeof(rkey), &key); in test_ige_enc_chaining() 256 AES_set_decrypt_key(rkey, 8 * sizeof(rkey), &key); in test_ige_enc_chaining() 270 AES_set_encrypt_key(rkey, 8 * sizeof(rkey), &key); in test_ige_dec_chaining() 278 AES_set_decrypt_key(rkey, 8 * sizeof(rkey), &key); in test_ige_dec_chaining() 300 AES_set_encrypt_key(rkey, 8 * sizeof(rkey), &key); in test_ige_garble_forwards() 307 AES_set_decrypt_key(rkey, 8 * sizeof(rkey), &key); in test_ige_garble_forwards() 335 AES_set_encrypt_key(rkey, 8 * sizeof(rkey), &key); in test_bi_ige_enc_dec() 340 AES_set_decrypt_key(rkey, 8 * sizeof(rkey), &key); in test_bi_ige_enc_dec() [all …]
|
/openssl/demos/cms/ |
H A D | cms_dec.c | 19 EVP_PKEY *rkey = NULL; in main() local 36 rkey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL); in main() 38 if (!rcert || !rkey) in main() 59 if (!CMS_decrypt(cms, rkey, rcert, NULL, out, 0)) in main() 73 EVP_PKEY_free(rkey); in main()
|
H A D | cms_ddec.c | 22 EVP_PKEY *rkey = NULL; in main() local 39 rkey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL); in main() 41 if (!rcert || !rkey) in main() 68 if (!CMS_decrypt(cms, rkey, rcert, dcont, out, 0)) in main() 82 EVP_PKEY_free(rkey); in main()
|
/openssl/demos/smime/ |
H A D | smdec.c | 19 EVP_PKEY *rkey = NULL; in main() local 36 rkey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL); in main() 38 if (!rcert || !rkey) in main() 59 if (!PKCS7_decrypt(p7, rkey, rcert, out, 0)) in main() 71 EVP_PKEY_free(rkey); in main()
|
/openssl/demos/certs/ |
H A D | ocsprun.sh | 14 -rsigner resp.pem -rkey respkey.pem -rother intca.pem $*
|
/openssl/apps/ |
H A D | ocsp.c | 71 EVP_PKEY *rkey, const EVP_MD *md, 223 EVP_PKEY *key = NULL, *rkey = NULL; in ocsp_main() local 611 rkey = load_key(rkeyfile, FORMAT_UNDEF, 0, passin, NULL, in ocsp_main() 613 if (rkey == NULL) in ocsp_main() 618 && (rkey == NULL || rsigner == NULL || rca_cert == NULL)) { in ocsp_main() 728 make_ocsp_response(bio_err, &resp, req, rdb, rca_cert, rsigner, rkey, in ocsp_main() 858 EVP_PKEY_free(rkey); in ocsp_main() 1032 EVP_PKEY *rkey, const EVP_MD *rmd, in make_ocsp_response() argument 1144 if (mctx == NULL || !EVP_DigestSignInit(mctx, &pkctx, rmd, NULL, rkey)) { in make_ocsp_response()
|
/openssl/crypto/cmp/ |
H A D | cmp_msg.c | 277 EVP_PKEY *rkey = OSSL_CMP_CTX_get0_newPkey(ctx, 0); in OSSL_CMP_CTX_setup_CRM() local 289 if (rkey == NULL && ctx->p10CSR != NULL) in OSSL_CMP_CTX_setup_CRM() 290 rkey = X509_REQ_get0_pubkey(ctx->p10CSR); in OSSL_CMP_CTX_setup_CRM() 291 if (rkey == NULL && refcert != NULL) in OSSL_CMP_CTX_setup_CRM() 292 rkey = X509_get0_pubkey(refcert); in OSSL_CMP_CTX_setup_CRM() 293 if (rkey == NULL) in OSSL_CMP_CTX_setup_CRM() 294 rkey = ctx->pkey; /* default is independent of ctx->oldCert */ in OSSL_CMP_CTX_setup_CRM() 295 if (rkey == NULL) { in OSSL_CMP_CTX_setup_CRM() 313 || !OSSL_CRMF_CERTTEMPLATE_fill(OSSL_CRMF_MSG_get0_tmpl(crm), rkey, in OSSL_CMP_CTX_setup_CRM()
|
H A D | cmp_client.c | 533 EVP_PKEY *rkey = OSSL_CMP_CTX_get0_newPkey(ctx /* may be NULL */, 0); in cert_response() local 596 if (rkey != NULL in cert_response() 598 && !(X509_check_private_key(ctx->newCert, rkey))) { in cert_response()
|
/openssl/engines/ |
H A D | e_capi.c | 646 RSA *rkey = NULL; in capi_get_pkey() local 686 rkey = RSA_new_method(eng); in capi_get_pkey() 687 if (!rkey) in capi_get_pkey() 699 RSA_set0_key(rkey, n, e, NULL); in capi_get_pkey() 708 RSA_set_ex_data(rkey, rsa_capi_idx, key); in capi_get_pkey() 713 EVP_PKEY_assign_RSA(ret, rkey); in capi_get_pkey() 714 rkey = NULL; in capi_get_pkey() 782 RSA_free(rkey); in capi_get_pkey()
|
/openssl/doc/man1/ |
H A D | openssl-ocsp.pod.in | 59 [B<-rkey> I<file>] 333 =item B<-rkey> I<file>
|