/openssl/test/recipes/ |
H A D | 15-test_rsax931.t | 22 my $inkey = srctop_file("test", "testrsa2048.pem"); 24 ok(run(app(['openssl', 'pkeyutl', '-in', $infile, '-rawin', '-inkey', $inkey, 31 ok(run(app(['openssl', 'pkeyutl', '-in', $infile, '-rawin', '-inkey', $inkey, 38 ok(!run(app(['openssl', 'pkeyutl', '-in', $infile, '-rawin', '-inkey', $inkey, 45 ok(!run(app(['openssl', 'pkeyutl', '-in', $infile, '-rawin', '-inkey', $inkey, 51 ok(run(app(['openssl', 'pkeyutl', '-in', $infile, '-rawin', '-inkey', $inkey, 58 ok(!run(app(['openssl', 'pkeyutl', '-in', $infile, '-rawin', '-inkey', $inkey,
|
/openssl/crypto/asn1/ |
H A D | d2i_pr.c | 181 STACK_OF(ASN1_TYPE) *inkey; in d2i_AutoPrivateKey_legacy() 191 inkey = d2i_ASN1_SEQUENCE_ANY(NULL, &p, length); in d2i_AutoPrivateKey_legacy() 197 if (sk_ASN1_TYPE_num(inkey) == 6) { in d2i_AutoPrivateKey_legacy() 199 } else if (sk_ASN1_TYPE_num(inkey) == 4) { in d2i_AutoPrivateKey_legacy() 201 } else if (sk_ASN1_TYPE_num(inkey) == 3) { /* This seems to be PKCS8, not in d2i_AutoPrivateKey_legacy() 206 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free); in d2i_AutoPrivateKey_legacy() 223 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free); in d2i_AutoPrivateKey_legacy()
|
/openssl/test/recipes/95-test_external_oqsprovider_data/ |
H A D | oqsprovider-pkcs12gen.sh | 47 $OPENSSL_APP pkcs12 -export -in tmp/$1_srv.crt -inkey tmp/$1_srv.key -passout pass: -out tmp/$1_srv… 58 …kcs12 -provider default -provider oqsprovider -export -in tmp/$1_srv.crt -inkey tmp/$1_srv.key -pa…
|
/openssl/apps/ |
H A D | ts.c | 50 const char *queryfile, const char *passin, const char *inkey, 57 const char *inkey, const EVP_MD *md, const char *signer, 169 char *inkey = NULL, *signer = NULL, *chain = NULL, *CApath = NULL; in ts_main() local 259 inkey = opt_arg(); in ts_main() 335 password, inkey, md, signer, chain, policy, in ts_main() 591 const char *queryfile, const char *passin, const char *inkey, in reply_command() argument 614 passin, inkey, md, signer, chain, policy); in reply_command() 700 const char *inkey, const EVP_MD *md, const char *signer, in create_response() argument 724 if (!TS_CONF_set_signer_key(conf, section, inkey, passin, resp_ctx)) in create_response()
|
H A D | pkeyutl.c | 144 const char *inkey = NULL; in pkeyutl_main() local 184 inkey = opt_arg(); in pkeyutl_main() 307 } else if (inkey == NULL) { in pkeyutl_main() 317 pkey = get_pkey(kdfalg, inkey, keyform, key_type, passinarg, pkey_op, e); in pkeyutl_main()
|
/openssl/doc/man1/ |
H A D | openssl-rsautl.pod.in | 16 [B<-inkey> I<filename>|I<uri>] 68 =item B<-inkey> I<filename>|I<uri> 144 openssl rsautl -sign -in file -inkey key.pem -out sig 148 openssl rsautl -verify -in sig -inkey key.pem 152 openssl rsautl -verify -in sig -inkey key.pem -raw -hexdump 204 openssl rsautl -in sig -verify -asn1parse -inkey pubkey.pem -pubin
|
H A D | openssl-pkeyutl.pod.in | 18 [B<-inkey> I<filename>|I<uri>] 109 =item B<-inkey> I<filename>|I<uri> 442 openssl pkeyutl -sign -in file -inkey key.pem -out sig 446 openssl pkeyutl -verifyrecover -in sig -inkey key.pem 450 openssl pkeyutl -verify -in file -sigfile sig -inkey key.pem 454 openssl pkeyutl -sign -in file -inkey key.pem -out sig -pkeyopt digest:sha256 458 openssl pkeyutl -derive -inkey key.pem -peerkey pubkey.pem -out secret 478 openssl pkeyutl -sign -in file -inkey sm2.key -out sig -rawin -digest sm3 \ 483 openssl pkeyutl -verify -certin -in file -inkey sm2.cert -sigfile sig \ 488 openssl pkeyutl -decrypt -in file -inkey key.pem -out secret \
|
H A D | openssl-smime.pod.in | 37 [B<-inkey> I<filename>|I<uri>] 254 =item B<-inkey> I<filename>|I<uri> 381 -signer mycert.pem -inkey mykey.pem -certfile mycerts.pem 416 openssl smime -decrypt -in mail.msg -recip mycert.pem -inkey key.pem
|
H A D | openssl-ts.pod.in | 35 [B<-inkey> I<filename>|I<uri>] 238 =item B<-inkey> I<filename>|I<uri> 428 The private key of the TSA in PEM format. The same as the B<-inkey> 546 openssl ts -reply -queryfile design1.tsq -inkey tsakey.pem \
|
H A D | openssl-pkcs12.pod.in | 49 [B<-inkey> I<filename>|I<uri>] 254 =item B<-inkey> I<filename>|I<uri> 476 openssl pkcs12 -export -in cert.pem -inkey key.pem -out file.p12 -legacy
|
H A D | openssl-cms.pod.in | 56 [B<-inkey> I<filename>|I<uri>] 348 =item B<-inkey> I<filename>|I<uri> 793 -signer mycert.pem -inkey mykey.pem -certfile mycerts.pem 828 openssl cms -decrypt -in mail.msg -recip mycert.pem -inkey key.pem
|
/openssl/providers/implementations/ciphers/ |
H A D | cipher_aes_cbc_hmac_sha.h | 18 void (*init_mac_key)(void *ctx, const unsigned char *inkey, size_t inlen);
|
/openssl/crypto/evp/ |
H A D | e_rc4_hmac_md5.c | 45 const unsigned char *inkey, in rc4_hmac_md5_init_key() argument 54 RC4_set_key(&key->ks, keylen, inkey); in rc4_hmac_md5_init_key()
|
H A D | e_chacha20_poly1305.c | 168 const unsigned char *inkey, in chacha20_poly1305_init_key() argument 173 if (!inkey && !iv) in chacha20_poly1305_init_key() 190 chacha_init_key(ctx, inkey, temp, enc); in chacha20_poly1305_init_key() 196 chacha_init_key(ctx, inkey, NULL, enc); in chacha20_poly1305_init_key()
|
H A D | e_aes_cbc_hmac_sha1.c | 70 const unsigned char *inkey, in aesni_cbc_hmac_sha1_init_key() argument 82 ret = aesni_set_encrypt_key(inkey, keylen, &key->ks); in aesni_cbc_hmac_sha1_init_key() 84 ret = aesni_set_decrypt_key(inkey, keylen, &key->ks); in aesni_cbc_hmac_sha1_init_key()
|
H A D | e_aes_cbc_hmac_sha256.c | 66 const unsigned char *inkey, in aesni_cbc_hmac_sha256_init_key() argument 73 ret = aesni_set_encrypt_key(inkey, in aesni_cbc_hmac_sha256_init_key() 77 ret = aesni_set_decrypt_key(inkey, in aesni_cbc_hmac_sha256_init_key()
|
/openssl/engines/ |
H A D | e_ossltest.c | 781 const unsigned char *inkey, in ossltest_aes128_cbc_hmac_sha1_init_key() argument
|