/openssl/demos/smime/ |
H A D | smsign.c | 19 EVP_PKEY *skey = NULL; in main() local 44 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL); in main() 46 if (!scert || !skey) in main() 57 p7 = PKCS7_sign(scert, skey, NULL, in, flags); in main() 85 EVP_PKEY_free(skey); in main()
|
H A D | smsign2.c | 19 EVP_PKEY *skey = NULL, *skey2 = NULL; in main() local 36 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL); in main() 67 if (!PKCS7_sign_add_signer(p7, scert, skey, NULL, 0)) in main() 92 EVP_PKEY_free(skey); in main()
|
/openssl/demos/cms/ |
H A D | cms_sign.c | 19 EVP_PKEY *skey = NULL; in main() local 44 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL); in main() 46 if (!scert || !skey) in main() 57 cms = CMS_sign(scert, skey, NULL, in, flags); in main() 84 EVP_PKEY_free(skey); in main()
|
H A D | cms_sign2.c | 19 EVP_PKEY *skey = NULL, *skey2 = NULL; in main() local 36 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL); in main() 67 if (!CMS_add1_signer(cms, scert, skey, NULL, 0)) in main() 93 EVP_PKEY_free(skey); in main()
|
/openssl/doc/man3/ |
H A D | EVP_PKEY_derive.pod | 70 unsigned char *skey; 87 skey = OPENSSL_malloc(skeylen); 89 if (!skey) 92 if (EVP_PKEY_derive(ctx, skey, &skeylen) <= 0) 95 /* Shared secret is skey bytes written to buffer skey */
|
/openssl/demos/certs/apps/ |
H A D | mkacerts.sh | 29 -key skey.pem -out sreq.pem -new 44 cat skey.pem >>server.pem
|
/openssl/demos/certs/ |
H A D | mkcerts.sh | 24 -keyout skey.pem -out req.pem -newkey rsa:1024 63 -key skey.pem -out dhsreq.pem 74 -key skey.pem -out dhcreq.pem
|
/openssl/crypto/ocsp/ |
H A D | ocsp_vfy.c | 79 EVP_PKEY *skey; in ocsp_verify() local 83 if ((skey = X509_get0_pubkey(signer)) == NULL) { in ocsp_verify() 88 ret = OCSP_REQUEST_verify(req, skey, signer->libctx, signer->propq); in ocsp_verify() 90 ret = OCSP_BASICRESP_verify(bs, skey, signer->libctx, signer->propq); in ocsp_verify()
|
/openssl/ssl/statem/ |
H A D | extensions_clnt.c | 1837 EVP_PKEY *ckey = s->s3.tmp.pkey, *skey = NULL; in tls_parse_stoc_key_share() local 1934 skey = EVP_PKEY_new(); in tls_parse_stoc_key_share() 1935 if (skey == NULL || EVP_PKEY_copy_parameters(skey, ckey) <= 0) { in tls_parse_stoc_key_share() 1937 EVP_PKEY_free(skey); in tls_parse_stoc_key_share() 1941 if (tls13_set_encoded_pub_key(skey, PACKET_data(&encoded_pt), in tls_parse_stoc_key_share() 1944 EVP_PKEY_free(skey); in tls_parse_stoc_key_share() 1948 if (ssl_derive(s, ckey, skey, 1) == 0) { in tls_parse_stoc_key_share() 1950 EVP_PKEY_free(skey); in tls_parse_stoc_key_share() 1953 s->s3.peer_tmp = skey; in tls_parse_stoc_key_share()
|
H A D | extensions_srvr.c | 1646 EVP_PKEY *ckey = s->s3.peer_tmp, *skey = NULL; in tls_construct_stoc_key_share() local 1699 skey = ssl_generate_pkey(s, ckey); in tls_construct_stoc_key_share() 1700 if (skey == NULL) { in tls_construct_stoc_key_share() 1706 encoded_pt_len = EVP_PKEY_get1_encoded_public_key(skey, &encodedPoint); in tls_construct_stoc_key_share() 1709 EVP_PKEY_free(skey); in tls_construct_stoc_key_share() 1716 EVP_PKEY_free(skey); in tls_construct_stoc_key_share() 1725 s->s3.tmp.pkey = skey; in tls_construct_stoc_key_share() 1726 if (ssl_derive(s, skey, ckey, 1) == 0) { in tls_construct_stoc_key_share()
|
H A D | statem_clnt.c | 3150 EVP_PKEY *ckey = NULL, *skey = NULL; in tls_construct_cke_dhe() local 3157 skey = s->s3.peer_tmp; in tls_construct_cke_dhe() 3158 if (skey == NULL) { in tls_construct_cke_dhe() 3163 ckey = ssl_generate_pkey(s, skey); in tls_construct_cke_dhe() 3169 if (ssl_derive(s, ckey, skey, 0) == 0) { in tls_construct_cke_dhe() 3215 EVP_PKEY *ckey = NULL, *skey = NULL; in tls_construct_cke_ecdhe() local 3218 skey = s->s3.peer_tmp; in tls_construct_cke_ecdhe() 3219 if (skey == NULL) { in tls_construct_cke_ecdhe() 3224 ckey = ssl_generate_pkey(s, skey); in tls_construct_cke_ecdhe() 3230 if (ssl_derive(s, ckey, skey, 0) == 0) { in tls_construct_cke_ecdhe()
|
H A D | statem_srvr.c | 3058 EVP_PKEY *skey = NULL; in tls_process_cke_dhe() local 3068 skey = s->s3.tmp.pkey; in tls_process_cke_dhe() 3069 if (skey == NULL) { in tls_process_cke_dhe() 3084 if (ckey == NULL || EVP_PKEY_copy_parameters(ckey, skey) == 0) { in tls_process_cke_dhe() 3094 if (ssl_derive(s, skey, ckey, 1) == 0) { in tls_process_cke_dhe() 3109 EVP_PKEY *skey = s->s3.tmp.pkey; in tls_process_cke_ecdhe() local 3132 if (skey == NULL) { in tls_process_cke_ecdhe() 3138 if (ckey == NULL || EVP_PKEY_copy_parameters(ckey, skey) <= 0) { in tls_process_cke_ecdhe() 3149 if (ssl_derive(s, skey, ckey, 1) == 0) { in tls_process_cke_ecdhe()
|
/openssl/crypto/x509/ |
H A D | x509_vfy.c | 2137 EVP_PKEY *skey, const EVP_MD *md, unsigned int flags) in X509_CRL_diff() argument 2174 if (skey != NULL && (X509_CRL_verify(base, skey) <= 0 || in X509_CRL_diff() 2175 X509_CRL_verify(newer, skey) <= 0)) { in X509_CRL_diff() 2245 if (skey != NULL && md != NULL && !X509_CRL_sign(crl, skey, md)) { in X509_CRL_diff()
|
/openssl/test/ |
H A D | sslapitest.c | 567 char *skey = test_mk_file_path(certsdir, "leaf.key"); in test_client_cert_verify_cb() local 583 || !TEST_int_eq(SSL_CTX_use_PrivateKey_file(sctx, skey, in test_client_cert_verify_cb() 634 OPENSSL_free(skey); in test_client_cert_verify_cb() 648 char *skey = test_mk_file_path(certsdir, "leaf.key"); in test_ssl_build_cert_chain() local 657 || !TEST_int_eq(SSL_use_PrivateKey_file(ssl, skey, SSL_FILETYPE_PEM), 1) in test_ssl_build_cert_chain() 668 OPENSSL_free(skey); in test_ssl_build_cert_chain() 687 char *skey = test_mk_file_path(certsdir, "leaf-encrypted.key"); in test_ssl_ctx_build_cert_chain() local 695 || !TEST_int_eq(SSL_CTX_use_PrivateKey_file(ctx, skey, in test_ssl_ctx_build_cert_chain() 706 OPENSSL_free(skey); in test_ssl_ctx_build_cert_chain()
|
/openssl/include/openssl/ |
H A D | x509.h.in | 777 EVP_PKEY *skey, const EVP_MD *md, unsigned int flags);
|