/openssl/apps/ |
H A D | smime.c | 290 keyfile = NULL; in smime_main() 305 if (keyfile != NULL) { in smime_main() 321 keyfile = opt_arg(); in smime_main() 395 if (!keyfile) in smime_main() 404 keyfile = NULL; in smime_main() 477 if (keyfile == NULL) in smime_main() 478 keyfile = recipfile; in smime_main() 480 if (keyfile == NULL) in smime_main() 481 keyfile = signerfile; in smime_main() 483 keyfile = NULL; in smime_main() [all …]
|
H A D | spkac.c | 66 char *challenge = NULL, *keyfile = NULL; in spkac_main() local 107 keyfile = opt_arg(); in spkac_main() 144 if (keyfile != NULL) { in spkac_main() 148 pkey = load_key(strcmp(keyfile, "-") ? keyfile : NULL, in spkac_main()
|
H A D | cms.c | 595 keyfile = NULL; in cms_main() 604 if (keyfile != NULL) { in cms_main() 619 keyfile = opt_arg(); in cms_main() 760 if (keyfile == NULL) in cms_main() 769 keyfile = NULL; in cms_main() 880 if (keyfile == NULL) in cms_main() 881 keyfile = recipfile; in cms_main() 883 if (keyfile == NULL) in cms_main() 884 keyfile = signerfile; in cms_main() 886 keyfile = NULL; in cms_main() [all …]
|
H A D | rsautl.c | 79 char *infile = NULL, *outfile = NULL, *keyfile = NULL; in rsautl_main() local 155 keyfile = opt_arg(); in rsautl_main() 190 pkey = load_key(keyfile, keyformat, 0, passin, e, "private key"); in rsautl_main() 194 pkey = load_pubkey(keyfile, keyformat, 0, NULL, e, "public key"); in rsautl_main() 198 x = load_cert(keyfile, FORMAT_UNDEF, "Certificate"); in rsautl_main()
|
H A D | dgst.c | 104 const char *outfile = NULL, *keyfile = NULL, *prog = NULL; in dgst_main() local 154 keyfile = opt_arg(); in dgst_main() 160 keyfile = opt_arg(); in dgst_main() 164 keyfile = opt_arg(); in dgst_main() 226 if (keyfile != NULL && argc > 1) { in dgst_main() 263 if (keyfile != NULL) in dgst_main() 273 if ((!(mac_name == NULL) + !(keyfile == NULL) + !(hmac_key == NULL)) > 1) { in dgst_main() 278 if (keyfile != NULL) { in dgst_main() 282 sigkey = load_pubkey(keyfile, keyform, 0, NULL, e, "public key"); in dgst_main() 284 sigkey = load_key(keyfile, keyform, 0, passin, e, "private key"); in dgst_main()
|
H A D | crl.c | 87 char *infile = NULL, *outfile = NULL, *crldiff = NULL, *keyfile = NULL; in crl_main() local 133 keyfile = opt_arg(); in crl_main() 259 if (!keyfile) { in crl_main() 266 pkey = load_key(keyfile, keyformat, 0, NULL, NULL, "CRL signing key"); in crl_main()
|
H A D | s_time.c | 124 char *host = SSL_CONNECT_NAME, *certfile = NULL, *keyfile = NULL, *prog; in s_time_main() local 169 keyfile = opt_arg(); in s_time_main() 258 if (!set_cert_stuff(ctx, certfile, keyfile)) in s_time_main()
|
H A D | pkeyutl.c | 24 const char *keyfile, int keyform, int key_type, 523 const char *keyfile, int keyform, int key_type, in init_ctx() argument 548 pkey = load_key(keyfile, keyform, 0, passin, e, "private key"); in init_ctx() 552 pkey = load_pubkey(keyfile, keyform, 0, NULL, e, "public key"); in init_ctx() 556 x = load_cert(keyfile, keyform, "Certificate"); in init_ctx()
|
H A D | req.c | 247 char *outfile = NULL, *keyfile = NULL, *digest = NULL; in req_main() local 302 keyfile = opt_arg(); in req_main() 607 if (keyfile != NULL) { in req_main() 608 pkey = load_key(keyfile, keyform, 0, passin, e, "private key"); in req_main() 673 if (keyout == NULL && keyfile == NULL) { in req_main() 679 if (pkey != NULL && (keyfile == NULL || keyout != NULL)) { in req_main() 729 if (keyfile != NULL) in req_main() 795 if (CAcert != NULL && keyfile != NULL) in req_main()
|
H A D | ocsp.c | 250 char *signfile = NULL, *keyfile = NULL; in ocsp_main() local 422 keyfile = opt_arg(); in ocsp_main() 692 if (keyfile == NULL) in ocsp_main() 693 keyfile = signfile; in ocsp_main() 704 key = load_key(keyfile, FORMAT_UNDEF, 0, NULL, NULL, in ocsp_main()
|
H A D | ca.c | 276 char *dgst = NULL, *policy = NULL, *keyfile = NULL; in ca_main() local 376 keyfile = opt_arg(); in ca_main() 584 if (keyfile == NULL in ca_main() 585 && (keyfile = lookup_conf(conf, section, ENV_PRIVATE_KEY)) == NULL) in ca_main() 595 pkey = load_key(keyfile, keyformat, 0, passin, e, "CA private key"); in ca_main()
|
/openssl/demos/certs/ |
H A D | mkcerts.sh | 81 $OPENSSL ca -valid server.pem -keyfile root.pem -cert root.pem \ 83 $OPENSSL ca -valid client.pem -keyfile root.pem -cert root.pem \ 85 $OPENSSL ca -valid rev.pem -keyfile root.pem -cert root.pem \ 88 $OPENSSL ca -gencrl -keyfile root.pem -cert root.pem -config ca.cnf \ 92 -keyfile root.pem -cert root.pem -config ca.cnf -md sha1 94 $OPENSSL ca -gencrl -keyfile root.pem -cert root.pem -config ca.cnf \
|
/openssl/apps/lib/ |
H A D | s_cb.c | 865 const char *keyfile; member 1029 if (exc->keyfile != NULL) { in load_excert() 1030 exc->key = load_key(exc->keyfile, exc->keyform, in load_excert() 1077 if (exc->keyfile != NULL) { in args_excert() 1081 exc->keyfile = opt_arg(); in args_excert()
|
/openssl/doc/man1/ |
H A D | openssl-ca.pod.in | 37 [B<-keyfile> I<filename>|I<uri>] 155 The CA certificate, which must match with B<-keyfile>. 162 =item B<-keyfile> I<filename>|I<uri> 205 the certificate requests were signed with (given with B<-keyfile>). 490 Same as the B<-keyfile> option. The file containing the
|
H A D | openssl-s_time.pod.in | 66 =item B<-key> I<keyfile>
|
H A D | openssl-req.pod.in | 662 default_keyfile = keyfile.pem
|