Home
last modified time | relevance | path

Searched refs:inkey (Results 1 – 17 of 17) sorted by relevance

/openssl/test/recipes/
H A D15-test_rsax931.t22 my $inkey = srctop_file("test", "testrsa2048.pem");
24 ok(run(app(['openssl', 'pkeyutl', '-in', $infile, '-rawin', '-inkey', $inkey,
31 ok(run(app(['openssl', 'pkeyutl', '-in', $infile, '-rawin', '-inkey', $inkey,
38 ok(!run(app(['openssl', 'pkeyutl', '-in', $infile, '-rawin', '-inkey', $inkey,
45 ok(!run(app(['openssl', 'pkeyutl', '-in', $infile, '-rawin', '-inkey', $inkey,
51 ok(run(app(['openssl', 'pkeyutl', '-in', $infile, '-rawin', '-inkey', $inkey,
58 ok(!run(app(['openssl', 'pkeyutl', '-in', $infile, '-rawin', '-inkey', $inkey,
/openssl/crypto/asn1/
H A Dd2i_pr.c181 STACK_OF(ASN1_TYPE) *inkey; in d2i_AutoPrivateKey_legacy()
191 inkey = d2i_ASN1_SEQUENCE_ANY(NULL, &p, length); in d2i_AutoPrivateKey_legacy()
197 if (sk_ASN1_TYPE_num(inkey) == 6) { in d2i_AutoPrivateKey_legacy()
199 } else if (sk_ASN1_TYPE_num(inkey) == 4) { in d2i_AutoPrivateKey_legacy()
201 } else if (sk_ASN1_TYPE_num(inkey) == 3) { /* This seems to be PKCS8, not in d2i_AutoPrivateKey_legacy()
206 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free); in d2i_AutoPrivateKey_legacy()
223 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free); in d2i_AutoPrivateKey_legacy()
/openssl/test/recipes/95-test_external_oqsprovider_data/
H A Doqsprovider-pkcs12gen.sh47 $OPENSSL_APP pkcs12 -export -in tmp/$1_srv.crt -inkey tmp/$1_srv.key -passout pass: -out tmp/$1_srv…
58 …kcs12 -provider default -provider oqsprovider -export -in tmp/$1_srv.crt -inkey tmp/$1_srv.key -pa…
/openssl/apps/
H A Dts.c50 const char *queryfile, const char *passin, const char *inkey,
57 const char *inkey, const EVP_MD *md, const char *signer,
169 char *inkey = NULL, *signer = NULL, *chain = NULL, *CApath = NULL; in ts_main() local
259 inkey = opt_arg(); in ts_main()
335 password, inkey, md, signer, chain, policy, in ts_main()
591 const char *queryfile, const char *passin, const char *inkey, in reply_command() argument
614 passin, inkey, md, signer, chain, policy); in reply_command()
700 const char *inkey, const EVP_MD *md, const char *signer, in create_response() argument
724 if (!TS_CONF_set_signer_key(conf, section, inkey, passin, resp_ctx)) in create_response()
H A Dpkeyutl.c144 const char *inkey = NULL; in pkeyutl_main() local
184 inkey = opt_arg(); in pkeyutl_main()
307 } else if (inkey == NULL) { in pkeyutl_main()
317 pkey = get_pkey(kdfalg, inkey, keyform, key_type, passinarg, pkey_op, e); in pkeyutl_main()
/openssl/doc/man1/
H A Dopenssl-rsautl.pod.in16 [B<-inkey> I<filename>|I<uri>]
68 =item B<-inkey> I<filename>|I<uri>
144 openssl rsautl -sign -in file -inkey key.pem -out sig
148 openssl rsautl -verify -in sig -inkey key.pem
152 openssl rsautl -verify -in sig -inkey key.pem -raw -hexdump
204 openssl rsautl -in sig -verify -asn1parse -inkey pubkey.pem -pubin
H A Dopenssl-pkeyutl.pod.in18 [B<-inkey> I<filename>|I<uri>]
109 =item B<-inkey> I<filename>|I<uri>
442 openssl pkeyutl -sign -in file -inkey key.pem -out sig
446 openssl pkeyutl -verifyrecover -in sig -inkey key.pem
450 openssl pkeyutl -verify -in file -sigfile sig -inkey key.pem
454 openssl pkeyutl -sign -in file -inkey key.pem -out sig -pkeyopt digest:sha256
458 openssl pkeyutl -derive -inkey key.pem -peerkey pubkey.pem -out secret
478 openssl pkeyutl -sign -in file -inkey sm2.key -out sig -rawin -digest sm3 \
483 openssl pkeyutl -verify -certin -in file -inkey sm2.cert -sigfile sig \
488 openssl pkeyutl -decrypt -in file -inkey key.pem -out secret \
H A Dopenssl-smime.pod.in37 [B<-inkey> I<filename>|I<uri>]
254 =item B<-inkey> I<filename>|I<uri>
381 -signer mycert.pem -inkey mykey.pem -certfile mycerts.pem
416 openssl smime -decrypt -in mail.msg -recip mycert.pem -inkey key.pem
H A Dopenssl-ts.pod.in35 [B<-inkey> I<filename>|I<uri>]
238 =item B<-inkey> I<filename>|I<uri>
428 The private key of the TSA in PEM format. The same as the B<-inkey>
546 openssl ts -reply -queryfile design1.tsq -inkey tsakey.pem \
H A Dopenssl-pkcs12.pod.in49 [B<-inkey> I<filename>|I<uri>]
254 =item B<-inkey> I<filename>|I<uri>
476 openssl pkcs12 -export -in cert.pem -inkey key.pem -out file.p12 -legacy
H A Dopenssl-cms.pod.in56 [B<-inkey> I<filename>|I<uri>]
348 =item B<-inkey> I<filename>|I<uri>
793 -signer mycert.pem -inkey mykey.pem -certfile mycerts.pem
828 openssl cms -decrypt -in mail.msg -recip mycert.pem -inkey key.pem
/openssl/providers/implementations/ciphers/
H A Dcipher_aes_cbc_hmac_sha.h18 void (*init_mac_key)(void *ctx, const unsigned char *inkey, size_t inlen);
/openssl/crypto/evp/
H A De_rc4_hmac_md5.c45 const unsigned char *inkey, in rc4_hmac_md5_init_key() argument
54 RC4_set_key(&key->ks, keylen, inkey); in rc4_hmac_md5_init_key()
H A De_chacha20_poly1305.c168 const unsigned char *inkey, in chacha20_poly1305_init_key() argument
173 if (!inkey && !iv) in chacha20_poly1305_init_key()
190 chacha_init_key(ctx, inkey, temp, enc); in chacha20_poly1305_init_key()
196 chacha_init_key(ctx, inkey, NULL, enc); in chacha20_poly1305_init_key()
H A De_aes_cbc_hmac_sha1.c70 const unsigned char *inkey, in aesni_cbc_hmac_sha1_init_key() argument
82 ret = aesni_set_encrypt_key(inkey, keylen, &key->ks); in aesni_cbc_hmac_sha1_init_key()
84 ret = aesni_set_decrypt_key(inkey, keylen, &key->ks); in aesni_cbc_hmac_sha1_init_key()
H A De_aes_cbc_hmac_sha256.c66 const unsigned char *inkey, in aesni_cbc_hmac_sha256_init_key() argument
73 ret = aesni_set_encrypt_key(inkey, in aesni_cbc_hmac_sha256_init_key()
77 ret = aesni_set_decrypt_key(inkey, in aesni_cbc_hmac_sha256_init_key()
/openssl/engines/
H A De_ossltest.c781 const unsigned char *inkey, in ossltest_aes128_cbc_hmac_sha1_init_key() argument

Completed in 33 milliseconds