Home
last modified time | relevance | path

Searched refs:FORMAT_UNDEF (Results 1 – 24 of 24) sorted by relevance

/openssl/apps/
H A Dpkcs8.c91 int informat = FORMAT_UNDEF, outformat = FORMAT_PEM, topk8 = 0, pbe_nid = -1; in pkcs8_main()
227 informat == FORMAT_UNDEF ? FORMAT_PEM : informat); in pkcs8_main()
310 if (informat == FORMAT_PEM || informat == FORMAT_UNDEF) { in pkcs8_main()
319 if (informat == FORMAT_PEM || informat == FORMAT_UNDEF) { in pkcs8_main()
H A Drsautl.c84 int keyformat = FORMAT_UNDEF, keysize, ret = 1, rv; in rsautl_main()
198 x = load_cert(keyfile, FORMAT_UNDEF, "Certificate"); in rsautl_main()
H A Dsmime.c183 FORMAT_UNDEF; in smime_main()
480 cert = load_cert(*argv, FORMAT_UNDEF, in smime_main()
499 if ((recip = load_cert(recipfile, FORMAT_UNDEF, in smime_main()
606 signer = load_cert(signerfile, FORMAT_UNDEF, "signer certificate"); in smime_main()
H A Drsa.c132 int informat = FORMAT_UNDEF, outformat = FORMAT_PEM, text = 0, check = 0; in rsa_main()
238 int tmpformat = FORMAT_UNDEF; in rsa_main()
H A Docsp.c425 issuer = load_cert(opt_arg(), FORMAT_UNDEF, "issuer certificate"); in ocsp_main()
438 cert = load_cert(opt_arg(), FORMAT_UNDEF, "certificate"); in ocsp_main()
585 rsigner = load_cert(rsignfile, FORMAT_UNDEF, "responder certificate"); in ocsp_main()
601 rkey = load_key(rkeyfile, FORMAT_UNDEF, 0, passin, NULL, in ocsp_main()
686 signer = load_cert(signfile, FORMAT_UNDEF, "signer certificate"); in ocsp_main()
696 key = load_key(keyfile, FORMAT_UNDEF, 0, NULL, NULL, in ocsp_main()
H A Dcms.c312 int verify_retcode = 0, rctformat = FORMAT_SMIME, keyform = FORMAT_UNDEF; in cms_main()
630 cert = load_cert(opt_arg(), FORMAT_UNDEF, in cms_main()
833 cert = load_cert(*argv, FORMAT_UNDEF, in cms_main()
851 if ((recip = load_cert(recipfile, FORMAT_UNDEF, in cms_main()
859 if ((originator = load_cert(originatorfile, FORMAT_UNDEF, in cms_main()
867 if ((signer = load_cert(signerfile, FORMAT_UNDEF, in cms_main()
1096 signer = load_cert(signerfile, FORMAT_UNDEF, "signer certificate"); in cms_main()
H A Dcrl.c92 int informat = FORMAT_UNDEF, outformat = FORMAT_PEM, keyformat = FORMAT_UNDEF; in crl_main()
H A Dx509.c290 int CAformat = FORMAT_UNDEF, CAkeyformat = FORMAT_UNDEF; in x509_main()
293 int informat = FORMAT_UNDEF, outformat = FORMAT_PEM, keyformat = FORMAT_UNDEF; in x509_main()
700 if (CAkeyformat != FORMAT_UNDEF) in x509_main()
702 if (CAformat != FORMAT_UNDEF) in x509_main()
H A Dgendsa.c126 pkey = load_keyparams(dsaparams, FORMAT_UNDEF, 1, "DSA", "DSA parameters"); in gendsa_main()
H A Dspkac.c73 int keyformat = FORMAT_UNDEF; in spkac_main()
H A Ddsaparam.c72 int informat = FORMAT_UNDEF, outformat = FORMAT_PEM, noout = 0; in dsaparam_main()
H A Ddsa.c86 int informat = FORMAT_UNDEF, outformat = FORMAT_PEM, text = 0, noout = 0; in dsa_main()
H A Dec.c76 int informat = FORMAT_UNDEF, outformat = FORMAT_PEM, text = 0, noout = 0; in ec_main()
H A Dpkey.c78 int informat = FORMAT_UNDEF, outformat = FORMAT_PEM; in pkey_main()
H A Dreq.c272 int informat = FORMAT_UNDEF, outformat = FORMAT_PEM, keyform = FORMAT_UNDEF; in req_main()
764 if ((CAkey = load_key(CAkeyfile, FORMAT_UNDEF, in req_main()
773 if ((CAcert = load_cert_pass(CAfile, FORMAT_UNDEF, 1, passin, in req_main()
H A Ds_server.c1039 int s_cert_format = FORMAT_UNDEF, s_key_format = FORMAT_UNDEF; in s_server_main()
1040 int s_dcert_format = FORMAT_UNDEF, s_dkey_format = FORMAT_UNDEF; in s_server_main()
1043 int state = 0, crl_format = FORMAT_UNDEF, crl_download = 0; in s_server_main()
2116 dhpkey = load_keyparams(dhfile, FORMAT_UNDEF, 0, "DH", "DH parameters"); in s_server_main()
2118 dhpkey = load_keyparams_suppress(s_cert_file, FORMAT_UNDEF, 0, "DH", in s_server_main()
2152 FORMAT_UNDEF, in s_server_main()
H A Dverify.c256 x = load_cert(file, FORMAT_UNDEF, "certificate file"); in check()
H A Dpkeyutl.c139 int keyform = FORMAT_UNDEF, peerform = FORMAT_UNDEF; in pkeyutl_main()
H A Dcmp.c159 static int opt_keyform = FORMAT_UNDEF;
769 cert = load_cert_pass(uri, FORMAT_UNDEF, 0, pass_string, desc); in load_cert_pwd()
1052 if ((crl = load_crl(file, FORMAT_UNDEF, 0, desc)) == NULL) in setup_mock_crlout()
1858 csr = load_csr_autofmt(opt_csr, FORMAT_UNDEF, NULL, "PKCS#10 CSR"); in setup_request_ctx()
3416 oldcrl = load_crl(opt_oldcrl, FORMAT_UNDEF, 0, in do_genm()
H A Ddgst.c108 int separator = 0, debug = 0, keyform = FORMAT_UNDEF, siglen = 0; in dgst_main()
H A Dca.c284 int certformat = FORMAT_UNDEF, informat = FORMAT_UNDEF; in ca_main()
300 int keyformat = FORMAT_UNDEF, multirdn = 1, notext = 0, output_der = 0; in ca_main()
H A Ds_client.c879 int build_chain = 0, cert_format = FORMAT_UNDEF; in s_client_main()
881 int key_format = FORMAT_UNDEF, crlf = 0, full_log = 1, mbuf_len = 0; in s_client_main()
889 int starttls_proto = PROTO_OFF, crl_format = FORMAT_UNDEF, crl_download = 0; in s_client_main()
/openssl/apps/include/
H A Dfmt.h27 # define FORMAT_UNDEF 0 macro
/openssl/apps/lib/
H A Dapps.c534 if (format == FORMAT_UNDEF) in load_csr()
563 if (format != FORMAT_UNDEF) { in load_csr_autofmt()
755 ret = load_key_certs_crls(uri, FORMAT_UNDEF, 0, pass_string, desc, 0, in load_cert_certs()
863 ret = load_key_certs_crls(uri, FORMAT_UNDEF, maybe_stdin, pass, desc, 0, in load_certs()
884 ret = load_key_certs_crls(uri, FORMAT_UNDEF, 0, pass, desc, 0, in load_crls()
2493 return load_crl(urlptr, FORMAT_UNDEF, 0, "CRL via CDP"); in load_crl_crldp()

Completed in 128 milliseconds