Home
last modified time | relevance | path

Searched refs:keyfile (Results 1 – 16 of 16) sorted by relevance

/openssl/apps/
H A Dsmime.c290 keyfile = NULL; in smime_main()
305 if (keyfile != NULL) { in smime_main()
321 keyfile = opt_arg(); in smime_main()
395 if (!keyfile) in smime_main()
404 keyfile = NULL; in smime_main()
477 if (keyfile == NULL) in smime_main()
478 keyfile = recipfile; in smime_main()
480 if (keyfile == NULL) in smime_main()
481 keyfile = signerfile; in smime_main()
483 keyfile = NULL; in smime_main()
[all …]
H A Dspkac.c66 char *challenge = NULL, *keyfile = NULL; in spkac_main() local
107 keyfile = opt_arg(); in spkac_main()
144 if (keyfile != NULL) { in spkac_main()
148 pkey = load_key(strcmp(keyfile, "-") ? keyfile : NULL, in spkac_main()
H A Dcms.c595 keyfile = NULL; in cms_main()
604 if (keyfile != NULL) { in cms_main()
619 keyfile = opt_arg(); in cms_main()
760 if (keyfile == NULL) in cms_main()
769 keyfile = NULL; in cms_main()
880 if (keyfile == NULL) in cms_main()
881 keyfile = recipfile; in cms_main()
883 if (keyfile == NULL) in cms_main()
884 keyfile = signerfile; in cms_main()
886 keyfile = NULL; in cms_main()
[all …]
H A Drsautl.c79 char *infile = NULL, *outfile = NULL, *keyfile = NULL; in rsautl_main() local
155 keyfile = opt_arg(); in rsautl_main()
190 pkey = load_key(keyfile, keyformat, 0, passin, e, "private key"); in rsautl_main()
194 pkey = load_pubkey(keyfile, keyformat, 0, NULL, e, "public key"); in rsautl_main()
198 x = load_cert(keyfile, FORMAT_UNDEF, "Certificate"); in rsautl_main()
H A Ddgst.c104 const char *outfile = NULL, *keyfile = NULL, *prog = NULL; in dgst_main() local
154 keyfile = opt_arg(); in dgst_main()
160 keyfile = opt_arg(); in dgst_main()
164 keyfile = opt_arg(); in dgst_main()
226 if (keyfile != NULL && argc > 1) { in dgst_main()
263 if (keyfile != NULL) in dgst_main()
273 if ((!(mac_name == NULL) + !(keyfile == NULL) + !(hmac_key == NULL)) > 1) { in dgst_main()
278 if (keyfile != NULL) { in dgst_main()
282 sigkey = load_pubkey(keyfile, keyform, 0, NULL, e, "public key"); in dgst_main()
284 sigkey = load_key(keyfile, keyform, 0, passin, e, "private key"); in dgst_main()
H A Dcrl.c87 char *infile = NULL, *outfile = NULL, *crldiff = NULL, *keyfile = NULL; in crl_main() local
133 keyfile = opt_arg(); in crl_main()
259 if (!keyfile) { in crl_main()
266 pkey = load_key(keyfile, keyformat, 0, NULL, NULL, "CRL signing key"); in crl_main()
H A Ds_time.c124 char *host = SSL_CONNECT_NAME, *certfile = NULL, *keyfile = NULL, *prog; in s_time_main() local
169 keyfile = opt_arg(); in s_time_main()
258 if (!set_cert_stuff(ctx, certfile, keyfile)) in s_time_main()
H A Dpkeyutl.c24 const char *keyfile, int keyform, int key_type,
523 const char *keyfile, int keyform, int key_type, in init_ctx() argument
548 pkey = load_key(keyfile, keyform, 0, passin, e, "private key"); in init_ctx()
552 pkey = load_pubkey(keyfile, keyform, 0, NULL, e, "public key"); in init_ctx()
556 x = load_cert(keyfile, keyform, "Certificate"); in init_ctx()
H A Dreq.c247 char *outfile = NULL, *keyfile = NULL, *digest = NULL; in req_main() local
302 keyfile = opt_arg(); in req_main()
607 if (keyfile != NULL) { in req_main()
608 pkey = load_key(keyfile, keyform, 0, passin, e, "private key"); in req_main()
673 if (keyout == NULL && keyfile == NULL) { in req_main()
679 if (pkey != NULL && (keyfile == NULL || keyout != NULL)) { in req_main()
729 if (keyfile != NULL) in req_main()
795 if (CAcert != NULL && keyfile != NULL) in req_main()
H A Docsp.c250 char *signfile = NULL, *keyfile = NULL; in ocsp_main() local
422 keyfile = opt_arg(); in ocsp_main()
692 if (keyfile == NULL) in ocsp_main()
693 keyfile = signfile; in ocsp_main()
704 key = load_key(keyfile, FORMAT_UNDEF, 0, NULL, NULL, in ocsp_main()
H A Dca.c276 char *dgst = NULL, *policy = NULL, *keyfile = NULL; in ca_main() local
376 keyfile = opt_arg(); in ca_main()
584 if (keyfile == NULL in ca_main()
585 && (keyfile = lookup_conf(conf, section, ENV_PRIVATE_KEY)) == NULL) in ca_main()
595 pkey = load_key(keyfile, keyformat, 0, passin, e, "CA private key"); in ca_main()
/openssl/demos/certs/
H A Dmkcerts.sh81 $OPENSSL ca -valid server.pem -keyfile root.pem -cert root.pem \
83 $OPENSSL ca -valid client.pem -keyfile root.pem -cert root.pem \
85 $OPENSSL ca -valid rev.pem -keyfile root.pem -cert root.pem \
88 $OPENSSL ca -gencrl -keyfile root.pem -cert root.pem -config ca.cnf \
92 -keyfile root.pem -cert root.pem -config ca.cnf -md sha1
94 $OPENSSL ca -gencrl -keyfile root.pem -cert root.pem -config ca.cnf \
/openssl/apps/lib/
H A Ds_cb.c865 const char *keyfile; member
1029 if (exc->keyfile != NULL) { in load_excert()
1030 exc->key = load_key(exc->keyfile, exc->keyform, in load_excert()
1077 if (exc->keyfile != NULL) { in args_excert()
1081 exc->keyfile = opt_arg(); in args_excert()
/openssl/doc/man1/
H A Dopenssl-ca.pod.in37 [B<-keyfile> I<filename>|I<uri>]
155 The CA certificate, which must match with B<-keyfile>.
162 =item B<-keyfile> I<filename>|I<uri>
205 the certificate requests were signed with (given with B<-keyfile>).
490 Same as the B<-keyfile> option. The file containing the
H A Dopenssl-s_time.pod.in66 =item B<-key> I<keyfile>
H A Dopenssl-req.pod.in662 default_keyfile = keyfile.pem

Completed in 75 milliseconds