Lines Matching defs:key
92 /* Default PSK identity and key */
103 unsigned char *key;
117 * lookup PSK identity and PSK key based on the given identity hint here
126 /* convert the PSK key to binary */
127 key = OPENSSL_hexstr2buf(psk_key, &key_len);
128 if (key == NULL) {
129 BIO_printf(bio_err, "Could not convert PSK key '%s' to buffer\n",
135 "psk buffer of callback is too small (%d) for key (%ld)\n",
137 OPENSSL_free(key);
141 memcpy(psk, key, key_len);
142 OPENSSL_free(key);
170 unsigned char *key = OPENSSL_hexstr2buf(psk_key, &key_len);
172 if (key == NULL) {
173 BIO_printf(bio_err, "Could not convert PSK key '%s' to buffer\n",
182 OPENSSL_free(key);
188 || !SSL_SESSION_set1_master_key(usesess, key, key_len)
191 OPENSSL_free(key);
194 OPENSSL_free(key);
525 {"key", OPT_KEY, 's', "Private key file to use; default: -cert file"},
527 {"pass", OPT_PASS, 's', "Private key and cert file pass phrase source"},
655 "Offer SRTP key management with a colon-separated profile list"},
785 EVP_PKEY *key = NULL;
1610 BIO_printf(bio_err, "Error getting private key password\n");
1628 key = load_key(key_file, key_format, 0, pass, e,
1629 "client certificate private key");
1630 if (key == NULL)
1804 BIO_printf(bio_c_out, "PSK key given, setting client callback\n");
1909 if (!set_cert_key_stuff(ctx, cert, key, chain, build_chain))
3098 EVP_PKEY_free(key);
3244 BIO_printf(bio, "Server public key is %d bit\n",
3344 exportedkeymat = app_malloc(keymatexportlen, "export key");