Lines Matching defs:pkey

1736     if (s->ext.tls13_cookie_len == 0 && s->s3.tmp.pkey != NULL) {
1863 EVP_PKEY *pkey = NULL;
1901 pkey = X509_get0_pubkey(x);
1903 if (pkey == NULL || EVP_PKEY_missing_parameters(pkey)) {
1909 if ((clu = ssl_cert_lookup_by_pkey(pkey, &certidx)) == NULL) {
1980 static int tls_process_ske_srp(SSL *s, PACKET *pkt, EVP_PKEY **pkey)
2016 *pkey = X509_get0_pubkey(s->session->peer);
2025 static int tls_process_ske_dhe(SSL *s, PACKET *pkt, EVP_PKEY **pkey)
2104 *pkey = X509_get0_pubkey(s->session->peer);
2105 /* else anonymous DH, so no certificate or pkey. */
2121 static int tls_process_ske_ecdhe(SSL *s, PACKET *pkt, EVP_PKEY **pkey)
2169 *pkey = X509_get0_pubkey(s->session->peer);
2171 *pkey = X509_get0_pubkey(s->session->peer);
2172 /* else anonymous ECDH, so no certificate or pkey. */
2182 EVP_PKEY *pkey = NULL;
2204 if (!tls_process_ske_srp(s, pkt, &pkey)) {
2209 if (!tls_process_ske_dhe(s, pkt, &pkey)) {
2214 if (!tls_process_ske_ecdhe(s, pkt, &pkey)) {
2224 if (pkey != NULL) {
2249 if (tls12_check_peer_sigalg(s, sigalg, pkey) <=0) {
2253 } else if (!tls1_set_peer_legacy_sigalg(s, pkey)) {
2282 s->ctx->libctx, s->ctx->propq, pkey,
2828 EVP_PKEY *pkey = NULL;
2842 pkey = X509_get0_pubkey(s->session->peer);
2843 if (!EVP_PKEY_is_a(pkey, "RSA")) {
2868 pctx = EVP_PKEY_CTX_new_from_pkey(s->ctx->libctx, pkey, s->ctx->propq);
3426 EVP_PKEY *pkey = NULL;
3460 i = ssl_do_client_cert_cb(s, &x509, &pkey);
3466 if ((i == 1) && (pkey != NULL) && (x509 != NULL)) {
3467 if (!SSL_use_certificate(s, x509) || !SSL_use_PrivateKey(s, pkey))
3475 EVP_PKEY_free(pkey);