Lines Matching refs:NULL

159     {NULL}
164 char *infile = NULL, *outfile = NULL, *keyname = NULL, *certfile = NULL; in pkcs12_main()
165 char *untrusted = NULL, *ciphername = NULL, *enc_name = NULL; in pkcs12_main()
166 char *passcertsarg = NULL, *passcerts = NULL; in pkcs12_main()
167 char *name = NULL, *csp_name = NULL; in pkcs12_main()
170 char *jdktrust = NULL; in pkcs12_main()
181 char *passinarg = NULL, *passoutarg = NULL, *passarg = NULL; in pkcs12_main()
182 char *passin = NULL, *passout = NULL, *macalg = NULL, *pbmac1_pbkdf2_md = NULL; in pkcs12_main()
183 char *cpass = NULL, *mpass = NULL, *badpass = NULL; in pkcs12_main()
184 const char *CApath = NULL, *CAfile = NULL, *CAstore = NULL, *prog; in pkcs12_main()
186 ENGINE *e = NULL; in pkcs12_main()
187 BIO *in = NULL, *out = NULL; in pkcs12_main()
188 PKCS12 *p12 = NULL; in pkcs12_main()
189 STACK_OF(OPENSSL_STRING) *canames = NULL; in pkcs12_main()
260 enc = NULL; in pkcs12_main()
261 ciphername = NULL; in pkcs12_main()
328 if (canames == NULL in pkcs12_main()
329 && (canames = sk_OPENSSL_STRING_new_null()) == NULL) in pkcs12_main()
382 if (!opt_check_rest_arg(NULL)) in pkcs12_main()
403 if (keyname != NULL) in pkcs12_main()
405 if (certfile != NULL) in pkcs12_main()
407 if (passcertsarg != NULL) in pkcs12_main()
411 if (untrusted != NULL) in pkcs12_main()
413 if (CAfile != NULL) in pkcs12_main()
415 if (CApath != NULL) in pkcs12_main()
417 if (CAstore != NULL) in pkcs12_main()
425 if (name != NULL) in pkcs12_main()
427 if (canames != NULL) in pkcs12_main()
429 if (csp_name != NULL) in pkcs12_main()
441 if (macalg != NULL) in pkcs12_main()
475 if (macalg == NULL) in pkcs12_main()
482 if (!app_passwd(passcertsarg, NULL, &passcerts, NULL)) { in pkcs12_main()
487 if (passarg != NULL) { in pkcs12_main()
499 if (cpass == NULL) { in pkcs12_main()
506 if (cpass != NULL) { in pkcs12_main()
538 EVP_PKEY *key = NULL; in pkcs12_main()
539 X509 *ee_cert = NULL, *x = NULL; in pkcs12_main()
540 STACK_OF(X509) *certs = NULL; in pkcs12_main()
541 STACK_OF(X509) *untrusted_certs = NULL; in pkcs12_main()
542 EVP_MD *macmd = NULL; in pkcs12_main()
543 unsigned char *catmp = NULL; in pkcs12_main()
545 ASN1_OBJECT *obj = NULL; in pkcs12_main()
563 if (key == NULL) in pkcs12_main()
577 if (key != NULL) { in pkcs12_main()
584 X509_keyid_set1(ee_cert, NULL, 0); in pkcs12_main()
585 X509_alias_set1(ee_cert, NULL, 0); in pkcs12_main()
591 if (ee_cert == NULL) { in pkcs12_main()
601 if (untrusted != NULL) { in pkcs12_main()
615 if (ee_cert_tmp == NULL && certs != NULL) in pkcs12_main()
618 if (ee_cert_tmp == NULL) { in pkcs12_main()
626 == NULL) in pkcs12_main()
651 if (certfile != NULL) { in pkcs12_main()
663 if (csp_name != NULL && key != NULL) in pkcs12_main()
668 if (add_lmk && key != NULL) in pkcs12_main()
669 EVP_PKEY_add1_attr_by_NID(key, NID_LocalKeySet, 0, NULL, -1); in pkcs12_main()
671 if (!noprompt && !(enc == NULL && maciter == -1)) { in pkcs12_main()
690 if (jdktrust != NULL) { in pkcs12_main()
699 if (p12 == NULL) { in pkcs12_main()
705 if (macalg != NULL) { in pkcs12_main()
712 if (!PKCS12_set_pbmac1_pbkdf2(p12, mpass, -1, NULL, in pkcs12_main()
719 if (!PKCS12_set_mac(p12, mpass, -1, NULL, macsaltlen, maciter, macmd)) { in pkcs12_main()
730 if (out == NULL) in pkcs12_main()
751 if (in == NULL) in pkcs12_main()
755 if (p12 == NULL) { in pkcs12_main()
759 if ((p12 = d2i_PKCS12_bio(in, &p12)) == NULL) { in pkcs12_main()
792 X509_ALGOR_get0(&macobj, NULL, NULL, macalgid); in pkcs12_main()
798 if (pbkdf2_param == NULL) { in pkcs12_main()
808 X509_ALGOR_get0(&prfobj, NULL, NULL, pbkdf2_param->prf); in pkcs12_main()
816 tmaciter != NULL ? ASN1_INTEGER_get(tmaciter) : 1L); in pkcs12_main()
818 tmac != NULL ? ASN1_STRING_length(tmac) : 0L, in pkcs12_main()
819 tsalt != NULL ? ASN1_STRING_length(tsalt) : 0L); in pkcs12_main()
827 PKCS12_get0_mac(NULL, &macalgid, NULL, NULL, p12); in pkcs12_main()
828 X509_ALGOR_get0(&macobj, NULL, NULL, macalgid); in pkcs12_main()
835 if (pkcs12kdf == NULL) { in pkcs12_main()
844 if (!mpass[0] && PKCS12_verify_mac(p12, NULL, 0)) { in pkcs12_main()
847 cpass = NULL; in pkcs12_main()
864 utmp = OPENSSL_asc2uni(mpass, -1, NULL, &utmplen); in pkcs12_main()
865 if (utmp == NULL) in pkcs12_main()
885 if (out == NULL) in pkcs12_main()
909 STACK_OF(X509_ATTRIBUTE) *attrs = NULL; in jdk_trust()
910 X509_ATTRIBUTE *attr = NULL; in jdk_trust()
913 if (cbarg == NULL) in jdk_trust()
936 STACK_OF(PKCS7) *asafes = NULL; in dump_certs_keys_p12()
941 if ((asafes = PKCS12_unpack_authsafes(p12)) == NULL) in dump_certs_keys_p12()
955 if (p7->d.encrypted == NULL) { in dump_certs_keys_p12()
965 if (bags == NULL) in dump_certs_keys_p12()
1016 if ((pkey = EVP_PKCS82PKEY(p8c)) == NULL) in dump_certs_pkeys_bag()
1019 ret = PEM_write_bio_PrivateKey(out, pkey, enc, NULL, 0, NULL, pempass); in dump_certs_pkeys_bag()
1030 X509_SIG_get0(tp8, &tp8alg, NULL); in dump_certs_pkeys_bag()
1036 if ((p8 = PKCS12_decrypt_skey(bag, pass, passlen)) == NULL) in dump_certs_pkeys_bag()
1038 if ((pkey = EVP_PKCS82PKEY(p8)) == NULL) { in dump_certs_pkeys_bag()
1044 ret = PEM_write_bio_PrivateKey(out, pkey, enc, NULL, 0, NULL, pempass); in dump_certs_pkeys_bag()
1061 if ((x509 = PKCS12_SAFEBAG_get1_cert(bag)) == NULL) in dump_certs_pkeys_bag()
1100 X509_STORE_CTX *store_ctx = NULL; in get_cert_chain()
1101 STACK_OF(X509) *chn = NULL; in get_cert_chain()
1105 if (store_ctx == NULL) { in get_cert_chain()
1131 PBEPARAM *pbe = NULL; in alg_print()
1144 PBE2PARAM *pbe2 = NULL; in alg_print()
1148 if (pbe2 == NULL) { in alg_print()
1154 X509_ALGOR_get0(&aoid, NULL, NULL, pbe2->encryption); in alg_print()
1160 PBKDF2PARAM *kdf = NULL; in alg_print()
1164 if (kdf == NULL) { in alg_print()
1169 if (kdf->prf == NULL) { in alg_print()
1172 X509_ALGOR_get0(&aoid, NULL, NULL, kdf->prf); in alg_print()
1180 SCRYPT_PARAMS *kdf = NULL; in alg_print()
1184 if (kdf == NULL) { in alg_print()
1201 if (pbe == NULL) { in alg_print()
1220 while ((cert = PEM_read_bio_X509(in, NULL, NULL, NULL))) { in cert_load()