/apps/ |
A D | pkcs8.c | 91 int informat = FORMAT_UNDEF, outformat = FORMAT_PEM, topk8 = 0, pbe_nid = -1; in pkcs8_main() 227 informat == FORMAT_UNDEF ? FORMAT_PEM : informat); in pkcs8_main() 310 if (informat == FORMAT_PEM || informat == FORMAT_UNDEF) { in pkcs8_main() 319 if (informat == FORMAT_PEM || informat == FORMAT_UNDEF) { in pkcs8_main()
|
A D | rsautl.c | 84 int keyformat = FORMAT_UNDEF, keysize, ret = 1, rv; in rsautl_main() 198 x = load_cert(keyfile, FORMAT_UNDEF, "Certificate"); in rsautl_main()
|
A D | smime.c | 183 FORMAT_UNDEF; in smime_main() 486 cert = load_cert(*argv, FORMAT_UNDEF, in smime_main() 505 if ((recip = load_cert(recipfile, FORMAT_UNDEF, in smime_main() 612 signer = load_cert(signerfile, FORMAT_UNDEF, "signer certificate"); in smime_main()
|
A D | ocsp.c | 425 issuer = load_cert(opt_arg(), FORMAT_UNDEF, "issuer certificate"); in ocsp_main() 438 cert = load_cert(opt_arg(), FORMAT_UNDEF, "certificate"); in ocsp_main() 585 rsigner = load_cert(rsignfile, FORMAT_UNDEF, "responder certificate"); in ocsp_main() 601 rkey = load_key(rkeyfile, FORMAT_UNDEF, 0, passin, NULL, in ocsp_main() 686 signer = load_cert(signfile, FORMAT_UNDEF, "signer certificate"); in ocsp_main() 696 key = load_key(keyfile, FORMAT_UNDEF, 0, NULL, NULL, in ocsp_main()
|
A D | rsa.c | 132 int informat = FORMAT_UNDEF, outformat = FORMAT_PEM, text = 0, check = 0; in rsa_main() 238 int tmpformat = FORMAT_UNDEF; in rsa_main()
|
A D | x509.c | 292 int CAformat = FORMAT_UNDEF, CAkeyformat = FORMAT_UNDEF; in x509_main() 295 int informat = FORMAT_UNDEF, outformat = FORMAT_PEM, keyformat = FORMAT_UNDEF; in x509_main() 707 if (CAkeyformat != FORMAT_UNDEF) in x509_main() 709 if (CAformat != FORMAT_UNDEF) in x509_main()
|
A D | crl.c | 92 int informat = FORMAT_UNDEF, outformat = FORMAT_PEM, keyformat = FORMAT_UNDEF; in crl_main()
|
A D | cms.c | 343 int verify_retcode = 0, rctformat = FORMAT_SMIME, keyform = FORMAT_UNDEF; in cms_main() 672 cert = load_cert(opt_arg(), FORMAT_UNDEF, in cms_main() 925 cert = load_cert(*argv, FORMAT_UNDEF, in cms_main() 940 && (recip = load_cert(recipfile, FORMAT_UNDEF, in cms_main() 945 && (originator = load_cert(originatorfile, FORMAT_UNDEF, in cms_main() 950 && (signer = load_cert(signerfile, FORMAT_UNDEF, in cms_main() 1218 signer = load_cert(signerfile, FORMAT_UNDEF, "signer certificate"); in cms_main()
|
A D | gendsa.c | 126 pkey = load_keyparams(dsaparams, FORMAT_UNDEF, 1, "DSA", "DSA parameters"); in gendsa_main()
|
A D | spkac.c | 73 int keyformat = FORMAT_UNDEF; in spkac_main()
|
A D | dsaparam.c | 72 int informat = FORMAT_UNDEF, outformat = FORMAT_PEM, noout = 0; in dsaparam_main()
|
A D | dsa.c | 86 int informat = FORMAT_UNDEF, outformat = FORMAT_PEM, text = 0, noout = 0; in dsa_main()
|
A D | ec.c | 76 int informat = FORMAT_UNDEF, outformat = FORMAT_PEM, text = 0, noout = 0; in ec_main()
|
A D | req.c | 272 int informat = FORMAT_UNDEF, outformat = FORMAT_PEM, keyform = FORMAT_UNDEF; in req_main() 764 if ((CAkey = load_key(CAkeyfile, FORMAT_UNDEF, in req_main() 773 if ((CAcert = load_cert_pass(CAfile, FORMAT_UNDEF, 1, passin, in req_main()
|
A D | pkey.c | 78 int informat = FORMAT_UNDEF, outformat = FORMAT_PEM; in pkey_main()
|
A D | s_server.c | 1258 int s_cert_format = FORMAT_UNDEF, s_key_format = FORMAT_UNDEF; in s_server_main() 1259 int s_dcert_format = FORMAT_UNDEF, s_dkey_format = FORMAT_UNDEF; in s_server_main() 1262 int state = 0, crl_format = FORMAT_UNDEF, crl_download = 0; in s_server_main() 2345 dhpkey = load_keyparams(dhfile, FORMAT_UNDEF, 0, "DH", "DH parameters"); in s_server_main() 2347 dhpkey = load_keyparams_suppress(s_cert_file, FORMAT_UNDEF, 0, "DH", in s_server_main() 2381 FORMAT_UNDEF, in s_server_main()
|
A D | verify.c | 256 x = load_cert(file, FORMAT_UNDEF, "certificate file"); in check()
|
A D | pkeyutl.c | 137 int keyform = FORMAT_UNDEF, peerform = FORMAT_UNDEF; in pkeyutl_main()
|
A D | cmp.c | 161 static int opt_keyform = FORMAT_UNDEF; 785 cert = load_cert_pass(uri, FORMAT_UNDEF, 0, pass_string, desc); in load_cert_pwd() 1068 if ((crl = load_crl(file, FORMAT_UNDEF, 0, desc)) == NULL) in setup_mock_crlout() 1911 csr = load_csr_autofmt(opt_csr, FORMAT_UNDEF, NULL, "PKCS#10 CSR"); in setup_request_ctx() 3482 oldcrl = load_crl(opt_oldcrl, FORMAT_UNDEF, 0, in do_genm()
|
A D | dgst.c | 111 int separator = 0, debug = 0, keyform = FORMAT_UNDEF, siglen = 0; in dgst_main()
|
A D | ca.c | 284 int certformat = FORMAT_UNDEF, informat = FORMAT_UNDEF; in ca_main() 300 int keyformat = FORMAT_UNDEF, multirdn = 1, notext = 0, output_der = 0; in ca_main()
|
A D | s_client.c | 893 int build_chain = 0, cert_format = FORMAT_UNDEF; in s_client_main() 895 int key_format = FORMAT_UNDEF, crlf = 0, full_log = 1, mbuf_len = 0; in s_client_main() 903 int starttls_proto = PROTO_OFF, crl_format = FORMAT_UNDEF, crl_download = 0; in s_client_main()
|
/apps/include/ |
A D | fmt.h | 27 # define FORMAT_UNDEF 0 macro
|
/apps/lib/ |
A D | apps.c | 539 if (format == FORMAT_UNDEF) in load_csr() 568 if (format != FORMAT_UNDEF) { in load_csr_autofmt() 760 ret = load_key_certs_crls(uri, FORMAT_UNDEF, 0, pass_string, desc, 0, in load_cert_certs() 868 ret = load_key_certs_crls(uri, FORMAT_UNDEF, maybe_stdin, pass, desc, 0, in load_certs() 889 ret = load_key_certs_crls(uri, FORMAT_UNDEF, 0, pass, desc, 0, in load_crls() 2505 return load_crl(urlptr, FORMAT_UNDEF, 0, "CRL via CDP"); in load_crl_crldp()
|