/freebsd-10-stable/contrib/wpa/wpa_supplicant/examples/ |
H A D | wpa2-eap-ccmp.conf | 13 private_key="/etc/cert/user.p12"
|
/freebsd-10-stable/crypto/heimdal/lib/hx509/ |
H A D | collector.c | 36 struct private_key { struct 38 hx509_private_key private_key; member in struct:private_key 47 struct private_key **data; 104 free_private_key(struct private_key *key) 107 if (key->private_key) 108 hx509_private_key_free(&key->private_key); 117 hx509_private_key private_key, 121 struct private_key *key; 143 if (private_key) { 144 key->private_key 114 _hx509_collector_private_key_add(hx509_context context, struct hx509_collector *c, const AlgorithmIdentifier *alg, hx509_private_key private_key, const heim_octet_string *key_data, const heim_octet_string *localKeyId) argument [all...] |
H A D | crypto.c | 77 } private_key; member in struct:hx509_private_key 452 sig->length = ECDSA_size(signer->private_key.ecdsa); 464 sig->data, &siglen, signer->private_key.ecdsa); 502 group = EC_KEY_get0_group(signer->private_key.ecdsa); 722 sig->length = RSA_size(signer->private_key.rsa); 732 signer->private_key.rsa, 756 hx509_private_key private_key) 762 private_key->private_key.rsa = 764 if (private_key 751 rsa_private_key_import(hx509_context context, const AlgorithmIdentifier *keyai, const void *data, size_t len, hx509_key_format_t format, hx509_private_key private_key) argument 781 rsa_private_key2SPKI(hx509_context context, hx509_private_key private_key, SubjectPublicKeyInfo *spki) argument 817 rsa_generate_private_key(hx509_context context, struct hx509_generate_private_context *ctx, hx509_private_key private_key) argument 926 ecdsa_private_key2SPKI(hx509_context context, hx509_private_key private_key, SubjectPublicKeyInfo *spki) argument 944 ecdsa_private_key_import(hx509_context context, const AlgorithmIdentifier *keyai, const void *data, size_t len, hx509_key_format_t format, hx509_private_key private_key) argument 1003 ecdsa_generate_private_key(hx509_context context, struct hx509_generate_private_context *ctx, hx509_private_key private_key) argument 1775 hx509_parse_private_key(hx509_context context, const AlgorithmIdentifier *keyai, const void *data, size_t len, hx509_key_format_t format, hx509_private_key *private_key) argument 1811 hx509_private_key2SPKI(hx509_context context, hx509_private_key private_key, SubjectPublicKeyInfo *spki) argument 1873 _hx509_generate_private_key(hx509_context context, struct hx509_generate_private_context *ctx, hx509_private_key *private_key) argument 2946 match_keys_rsa(hx509_cert c, hx509_private_key private_key) argument 3002 match_keys_ec(hx509_cert c, hx509_private_key private_key) argument [all...] |
H A D | cert.c | 81 hx509_private_key private_key; member in struct:hx509_cert_data 231 (*cert)->private_key = NULL; 307 /* Doesn't make a copy of `private_key'. */ 310 _hx509_cert_assign_key(hx509_cert cert, hx509_private_key private_key) argument 312 if (cert->private_key) 313 hx509_private_key_free(&cert->private_key); 314 cert->private_key = _hx509_private_key_ref(private_key); 343 if (cert->private_key) 344 hx509_private_key_free(&cert->private_key); [all...] |
H A D | ks_p11.c | 97 CK_OBJECT_HANDLE private_key; member in struct:p11_rsa 130 CK_OBJECT_HANDLE key = p11rsa->private_key; 168 CK_OBJECT_HANDLE key = p11rsa->private_key; 638 p11rsa->private_key = object;
|
H A D | hxtool.c | 1751 hx509_private_key private_key = NULL; local 1812 ret = read_private_key(opt->ca_private_key_string, &private_key); 1816 ret = hx509_private_key2SPKI(context, private_key, &spki); 1821 cert_key = private_key; 1866 private_key = cert_key; 1975 ret = hx509_ca_sign_self(context, tbs, private_key, &cert); 2016 if (private_key != cert_key) 2017 hx509_private_key_free(&private_key);
|
/freebsd-10-stable/contrib/wpa/src/tls/ |
H A D | tlsv1_cred.h | 33 const char *private_key,
|
H A D | rsa.c | 18 int private_key; /* whether private key is set */ member in struct:crypto_rsa_key 21 /* The following parameters are available only if private_key is set */ 137 key->private_key = 1; 249 if (use_private && !key->private_key)
|
H A D | tlsv1_cred.c | 310 * @private_key: File or reference name for the key in PEM or DER format 313 * @private_key_blob: private_key as inlined data or %NULL if not used 318 const char *private_key, 331 if (private_key) { 336 buf = (u8 *) os_readfile(private_key, &len); 339 private_key); 317 tlsv1_set_private_key(struct tlsv1_credentials *cred, const char *private_key, const char *private_key_passwd, const u8 *private_key_blob, size_t private_key_blob_len) argument
|
/freebsd-10-stable/crypto/openssl/crypto/asn1/ |
H A D | n_pkey.c | 74 ASN1_OCTET_STRING *private_key; member in struct:netscape_pkey_st 99 ASN1_SIMPLE(NETSCAPE_PKEY, private_key, ASN1_OCTET_STRING) 150 pkey->private_key->length = rsalen; 176 pkey->private_key->data = zz; 193 OPENSSL_cleanse(pkey->private_key->data, rsalen); 326 zz = pkey->private_key->data; 327 if ((ret = d2i_RSAPrivateKey(a, &zz, pkey->private_key->length)) == NULL) {
|
/freebsd-10-stable/contrib/wpa/wpa_supplicant/ |
H A D | wpa_supplicant.conf | 329 # private_key: File path to client private key file (PEM/DER/PFX) 337 # configuring private_key in one of the following formats: 343 # For example: private_key="hash://63093aa9c47f56ae88334c7b65a4" 661 # private_key: File path to client private key file (PEM/DER/PFX) 667 # configuring private_key in one of the following formats: 670 # for example: private_key="hash://63093aa9c47f56ae88334c7b65a4" 898 private_key="/etc/cert/user.prv" 1012 private_key="/etc/cert/user.prv" 1118 private_key="/etc/cert/user.prv"
|
H A D | config.h | 109 * private_key - File path to client private key file (PEM/DER/PFX) 118 * configuring private_key in one of the following formats: 124 * For example: private_key="hash://63093aa9c47f56ae88334c7b65a4" 133 char *private_key; member in struct:wpa_cred
|
H A D | interworking.c | 585 (cred->private_key == NULL || 586 cred->private_key[0] == '\0'))) 594 if (cred->private_key && cred->private_key[0] && 1090 if (cred->private_key && 1091 os_strncmp(cred->private_key, "keystore://", 11) == 0) { 1095 cred->private_key + 11) < 0 || 1100 if (cred->private_key && cred->private_key[0] && 1101 wpa_config_set_quoted(ssid, "private_key", cre [all...] |
H A D | config_file.c | 641 STR(private_key); 718 if (cred->private_key) 719 fprintf(f, "\tprivate_key=\"%s\"\n", cred->private_key);
|
H A D | config.c | 1580 { STRe(private_key) }, 1763 os_free(eap->private_key); 1831 os_free(cred->private_key); 2361 if (os_strcmp(var, "private_key") == 0) { 2362 os_free(cred->private_key); 2363 cred->private_key = val;
|
/freebsd-10-stable/contrib/wpa/src/eap_peer/ |
H A D | eap_config.h | 129 * private_key - File path to client private key file (PEM/DER/PFX) 138 * configuring private_key in one of the following formats: 144 * For example: private_key="hash://63093aa9c47f56ae88334c7b65a4" 153 u8 *private_key; member in struct:eap_peer_config 258 * This field is like private_key, but used for phase 2 (inside
|
H A D | eap_tls.c | 34 ((sm->init_phase2 ? config->private_key2 : config->private_key) 56 } else if (config->private_key && !config->private_key_passwd)
|
H A D | eap_tls_common.c | 76 params->private_key = (char *) config->private_key; 97 params->private_key = (char *) config->private_key2; 147 eap_tls_check_blob(sm, ¶ms->private_key,
|
/freebsd-10-stable/contrib/wpa/src/crypto/ |
H A D | tls_openssl.c | 67 EVP_PKEY *private_key; /* the private key if using engine */ member in struct:tls_connection 839 conn->private_key = ENGINE_load_private_key(conn->engine, 841 if (!conn->private_key) { 871 if (conn->private_key) { 872 EVP_PKEY_free(conn->private_key); 873 conn->private_key = NULL; 887 if (conn->private_key) { 888 EVP_PKEY_free(conn->private_key); 889 conn->private_key = NULL; 1780 static int tls_read_pkcs12(SSL_CTX *ssl_ctx, SSL *ssl, const char *private_key, argument 1961 tls_connection_private_key(void *_ssl_ctx, struct tls_connection *conn, const char *private_key, const char *private_key_passwd, const u8 *private_key_blob, size_t private_key_blob_len) argument 2106 tls_global_private_key(SSL_CTX *ssl_ctx, const char *private_key, const char *private_key_passwd) argument [all...] |
H A D | tls_gnutls.c | 567 if (params->client_cert && params->private_key) { 570 conn->xcred, params->client_cert, params->private_key, 577 params->private_key, GNUTLS_X509_FMT_DER); 585 } else if (params->private_key) { 591 conn->xcred, params->private_key, GNUTLS_X509_FMT_DER, 594 wpa_printf(MSG_DEBUG, "Failed to load private_key in " 678 if (params->client_cert && params->private_key) { 682 params->private_key, GNUTLS_X509_FMT_PEM); 688 params->private_key, GNUTLS_X509_FMT_DER); 696 } else if (params->private_key) { [all...] |
H A D | tls.h | 101 * @private_key: File or reference name for client private key in PEM or DER 103 * @private_key_blob: private_key as inlined data or %NULL if not used 139 const char *private_key; member in struct:tls_connection_params
|
H A D | tls_internal.c | 187 if (tlsv1_set_private_key(cred, params->private_key, 247 if (tlsv1_set_private_key(cred, params->private_key,
|
/freebsd-10-stable/contrib/wpa/src/ap/ |
H A D | authsrv.c | 148 params.private_key = hapd->conf->private_key;
|
H A D | ap_config.h | 294 char *private_key; member in struct:hostapd_bss_config
|
/freebsd-10-stable/etc/rc.d/ |
H A D | sendmail | 80 private_key = \$dir/cakey.pem
|