/openssl-master/apps/ |
A D | smime.c | 289 keyfile = NULL; in smime_main() 304 if (keyfile != NULL) { in smime_main() 320 keyfile = opt_arg(); in smime_main() 396 if (!keyfile) in smime_main() 405 keyfile = NULL; in smime_main() 478 if (keyfile == NULL) in smime_main() 479 keyfile = recipfile; in smime_main() 481 if (keyfile == NULL) in smime_main() 482 keyfile = signerfile; in smime_main() 484 keyfile = NULL; in smime_main() [all …]
|
A D | cms.c | 587 keyfile = NULL; in cms_main() 596 if (keyfile != NULL) { in cms_main() 611 keyfile = opt_arg(); in cms_main() 754 if (keyfile == NULL) in cms_main() 763 keyfile = NULL; in cms_main() 874 if (keyfile == NULL) in cms_main() 875 keyfile = recipfile; in cms_main() 877 if (keyfile == NULL) in cms_main() 878 keyfile = signerfile; in cms_main() 880 keyfile = NULL; in cms_main() [all …]
|
A D | spkac.c | 66 char *challenge = NULL, *keyfile = NULL; in spkac_main() local 107 keyfile = opt_arg(); in spkac_main() 145 if (keyfile != NULL) { in spkac_main() 149 pkey = load_key(strcmp(keyfile, "-") ? keyfile : NULL, in spkac_main()
|
A D | dgst.c | 104 const char *outfile = NULL, *keyfile = NULL, *prog = NULL; in dgst_main() local 153 keyfile = opt_arg(); in dgst_main() 159 keyfile = opt_arg(); in dgst_main() 163 keyfile = opt_arg(); in dgst_main() 225 if (keyfile != NULL && argc > 1) { in dgst_main() 262 if (keyfile != NULL) in dgst_main() 272 if ((!(mac_name == NULL) + !(keyfile == NULL) + !(hmac_key == NULL)) > 1) { in dgst_main() 277 if (keyfile != NULL) { in dgst_main() 281 sigkey = load_pubkey(keyfile, keyform, 0, NULL, e, "public key"); in dgst_main() 283 sigkey = load_key(keyfile, keyform, 0, passin, e, "private key"); in dgst_main()
|
A D | rsautl.c | 79 char *infile = NULL, *outfile = NULL, *keyfile = NULL; in rsautl_main() local 155 keyfile = opt_arg(); in rsautl_main() 191 pkey = load_key(keyfile, keyformat, 0, passin, e, "private key"); in rsautl_main() 195 pkey = load_pubkey(keyfile, keyformat, 0, NULL, e, "public key"); in rsautl_main() 199 x = load_cert(keyfile, FORMAT_UNDEF, "Certificate"); in rsautl_main()
|
A D | crl.c | 87 char *infile = NULL, *outfile = NULL, *crldiff = NULL, *keyfile = NULL; in crl_main() local 132 keyfile = opt_arg(); in crl_main() 261 if (!keyfile) { in crl_main() 268 pkey = load_key(keyfile, keyformat, 0, NULL, NULL, "CRL signing key"); in crl_main()
|
A D | s_time.c | 124 char *host = SSL_CONNECT_NAME, *certfile = NULL, *keyfile = NULL, *prog; in s_time_main() local 169 keyfile = opt_arg(); in s_time_main() 259 if (!set_cert_stuff(ctx, certfile, keyfile)) in s_time_main()
|
A D | pkeyutl.c | 24 const char *keyfile, int keyform, int key_type, 524 const char *keyfile, int keyform, int key_type, in init_ctx() argument 549 pkey = load_key(keyfile, keyform, 0, passin, e, "private key"); in init_ctx() 553 pkey = load_pubkey(keyfile, keyform, 0, NULL, e, "public key"); in init_ctx() 557 x = load_cert(keyfile, keyform, "Certificate"); in init_ctx()
|
A D | req.c | 249 char *outfile = NULL, *keyfile = NULL, *digest = NULL; in req_main() local 303 keyfile = opt_arg(); in req_main() 612 if (keyfile != NULL) { in req_main() 613 pkey = load_key(keyfile, keyform, 0, passin, e, "private key"); in req_main() 678 if (keyout == NULL && keyfile == NULL) { in req_main() 684 if (pkey != NULL && (keyfile == NULL || keyout != NULL)) { in req_main() 734 if (keyfile != NULL) in req_main() 799 if (CAcert != NULL && keyfile != NULL) in req_main()
|
A D | ocsp.c | 248 char *signfile = NULL, *keyfile = NULL; in ocsp_main() local 419 keyfile = opt_arg(); in ocsp_main() 688 if (keyfile == NULL) in ocsp_main() 689 keyfile = signfile; in ocsp_main() 700 key = load_key(keyfile, FORMAT_UNDEF, 0, NULL, NULL, in ocsp_main()
|
A D | ca.c | 276 char *dgst = NULL, *policy = NULL, *keyfile = NULL; in ca_main() local 373 keyfile = opt_arg(); in ca_main() 581 if (keyfile == NULL in ca_main() 582 && (keyfile = lookup_conf(conf, section, ENV_PRIVATE_KEY)) == NULL) in ca_main() 592 pkey = load_key(keyfile, keyformat, 0, passin, e, "CA private key"); in ca_main()
|
/openssl-master/demos/certs/ |
A D | mkcerts.sh | 81 $OPENSSL ca -valid server.pem -keyfile root.pem -cert root.pem \ 83 $OPENSSL ca -valid client.pem -keyfile root.pem -cert root.pem \ 85 $OPENSSL ca -valid rev.pem -keyfile root.pem -cert root.pem \ 88 $OPENSSL ca -gencrl -keyfile root.pem -cert root.pem -config ca.cnf \ 92 -keyfile root.pem -cert root.pem -config ca.cnf -md sha1 94 $OPENSSL ca -gencrl -keyfile root.pem -cert root.pem -config ca.cnf \
|
/openssl-master/apps/lib/ |
A D | s_cb.c | 854 const char *keyfile; member 1016 if (exc->keyfile != NULL) { in load_excert() 1017 exc->key = load_key(exc->keyfile, exc->keyform, in load_excert() 1064 if (exc->keyfile != NULL) { in args_excert() 1068 exc->keyfile = opt_arg(); in args_excert()
|
/openssl-master/doc/man1/ |
A D | openssl-ca.pod.in | 36 [B<-keyfile> I<filename>|I<uri>] 149 The CA certificate, which must match with B<-keyfile>. 156 =item B<-keyfile> I<filename>|I<uri> 199 the certificate requests were signed with (given with B<-keyfile>). 484 Same as the B<-keyfile> option. The file containing the
|
A D | openssl-s_time.pod.in | 66 =item B<-key> I<keyfile>
|
A D | openssl-req.pod.in | 662 default_keyfile = keyfile.pem
|