/openssl/apps/ |
H A D | smime.c | 325 keyfile = NULL; in smime_main() 340 if (keyfile != NULL) { in smime_main() 356 keyfile = opt_arg(); in smime_main() 430 if (!keyfile) in smime_main() 439 keyfile = NULL; in smime_main() 507 if (keyfile == NULL) in smime_main() 508 keyfile = recipfile; in smime_main() 510 if (keyfile == NULL) in smime_main() 511 keyfile = signerfile; in smime_main() 513 keyfile = NULL; in smime_main() [all …]
|
H A D | spkac.c | 66 char *challenge = NULL, *keyfile = NULL; in spkac_main() local 107 keyfile = opt_arg(); in spkac_main() 144 if (keyfile != NULL) { in spkac_main() 148 pkey = load_key(strcmp(keyfile, "-") ? keyfile : NULL, in spkac_main()
|
H A D | cms.c | 598 keyfile = NULL; in cms_main() 607 if (keyfile != NULL) { in cms_main() 622 keyfile = opt_arg(); in cms_main() 764 if (keyfile == NULL) in cms_main() 773 keyfile = NULL; in cms_main() 875 if (keyfile == NULL) in cms_main() 876 keyfile = recipfile; in cms_main() 878 if (keyfile == NULL) in cms_main() 879 keyfile = signerfile; in cms_main() 881 keyfile = NULL; in cms_main() [all …]
|
H A D | rsautl.c | 79 char *infile = NULL, *outfile = NULL, *keyfile = NULL; in rsautl_main() local 155 keyfile = opt_arg(); in rsautl_main() 190 pkey = load_key(keyfile, keyformat, 0, passin, e, "private key"); in rsautl_main() 194 pkey = load_pubkey(keyfile, keyformat, 0, NULL, e, "public key"); in rsautl_main() 198 x = load_cert(keyfile, FORMAT_UNDEF, "Certificate"); in rsautl_main()
|
H A D | dgst.c | 104 const char *outfile = NULL, *keyfile = NULL, *prog = NULL; in dgst_main() local 156 keyfile = opt_arg(); in dgst_main() 162 keyfile = opt_arg(); in dgst_main() 166 keyfile = opt_arg(); in dgst_main() 228 if (keyfile != NULL && argc > 1) { in dgst_main() 265 if (keyfile != NULL) in dgst_main() 275 if ((!(mac_name == NULL) + !(keyfile == NULL) + !(hmac_key == NULL)) > 1) { in dgst_main() 280 if (keyfile != NULL) { in dgst_main() 284 sigkey = load_pubkey(keyfile, keyform, 0, NULL, e, "public key"); in dgst_main() 286 sigkey = load_key(keyfile, keyform, 0, passin, e, "private key"); in dgst_main()
|
H A D | crl.c | 87 char *infile = NULL, *outfile = NULL, *crldiff = NULL, *keyfile = NULL; in crl_main() local 133 keyfile = opt_arg(); in crl_main() 260 if (!keyfile) { in crl_main() 267 pkey = load_key(keyfile, keyformat, 0, NULL, NULL, "CRL signing key"); in crl_main()
|
H A D | s_time.c | 124 char *host = SSL_CONNECT_NAME, *certfile = NULL, *keyfile = NULL, *prog; in s_time_main() local 169 keyfile = opt_arg(); in s_time_main() 258 if (!set_cert_stuff(ctx, certfile, keyfile)) in s_time_main()
|
H A D | pkeyutl.c | 24 const char *keyfile, int keyform, int key_type, 589 const char *keyfile, int keyform, int key_type, in get_pkey() argument 608 pkey = load_key(keyfile, keyform, 0, passin, e, "private key"); in get_pkey() 612 pkey = load_pubkey(keyfile, keyform, 0, NULL, e, "public key"); in get_pkey() 616 x = load_cert(keyfile, keyform, "Certificate"); in get_pkey()
|
H A D | req.c | 260 char *outfile = NULL, *keyfile = NULL, *digest = NULL; in req_main() local 314 keyfile = opt_arg(); in req_main() 626 if (keyfile != NULL) { in req_main() 627 pkey = load_key(keyfile, keyform, 0, passin, e, "private key"); in req_main() 695 if (keyout == NULL && keyfile == NULL) in req_main() 698 if (pkey != NULL && (keyfile == NULL || keyout != NULL)) { in req_main() 744 if (keyfile != NULL) in req_main() 810 if (CAcert != NULL && keyfile != NULL) in req_main()
|
H A D | ocsp.c | 244 char *signfile = NULL, *keyfile = NULL; in ocsp_main() local 416 keyfile = opt_arg(); in ocsp_main() 684 if (keyfile == NULL) in ocsp_main() 685 keyfile = signfile; in ocsp_main() 696 key = load_key(keyfile, FORMAT_UNDEF, 0, NULL, NULL, in ocsp_main()
|
H A D | ca.c | 282 char *dgst = NULL, *policy = NULL, *keyfile = NULL; in ca_main() local 384 keyfile = opt_arg(); in ca_main() 583 if (keyfile == NULL in ca_main() 584 && (keyfile = lookup_conf(conf, section, ENV_PRIVATE_KEY)) == NULL) in ca_main() 594 pkey = load_key(keyfile, keyformat, 0, passin, e, "CA private key"); in ca_main()
|
/openssl/demos/certs/ |
H A D | mkcerts.sh | 86 opensslcmd ca -valid server.pem -keyfile root.pem -cert root.pem \ 88 opensslcmd ca -valid client.pem -keyfile root.pem -cert root.pem \ 90 opensslcmd ca -valid rev.pem -keyfile root.pem -cert root.pem \ 93 opensslcmd ca -gencrl -keyfile root.pem -cert root.pem -config ca.cnf \ 97 -keyfile root.pem -cert root.pem -config ca.cnf -md sha1 99 opensslcmd ca -gencrl -keyfile root.pem -cert root.pem -config ca.cnf \
|
/openssl/util/ |
H A D | quicserver.c | 148 char *hostname, *port, *certfile, *keyfile; in main() local 192 keyfile = argv[argnext++]; in main() 207 qtserv = ossl_quic_tserver_new(&tserver_args, certfile, keyfile); in main()
|
/openssl/test/ |
H A D | quic_tserver_test.c | 25 static const char *certfile, *keyfile; variable 127 keyfile))) { in do_test() 428 || !TEST_ptr(keyfile = test_get_argument(1))) in setup_tests()
|
H A D | quic_multistream_test.c | 26 static const char *certfile, *keyfile; variable 756 if (!TEST_ptr(h->s_priv = ossl_quic_tserver_new(&s_args, certfile, keyfile))) in helper_init() 5965 || !TEST_ptr(keyfile = test_get_argument(1))) in setup_tests()
|
/openssl/ssl/quic/ |
H A D | quic_tserver.c | 80 const char *certfile, const char *keyfile) in ossl_quic_tserver_new() argument 112 if (keyfile != NULL in ossl_quic_tserver_new() 113 && SSL_CTX_use_PrivateKey_file(srv->ctx, keyfile, SSL_FILETYPE_PEM) <= 0) in ossl_quic_tserver_new()
|
/openssl/include/internal/ |
H A D | quic_tserver.h | 49 const char *certfile, const char *keyfile);
|
/openssl/test/helpers/ |
H A D | quictestlib.h | 45 SSL_CTX *serverctx, char *certfile, char *keyfile,
|
H A D | quictestlib.c | 126 SSL_CTX *serverctx, char *certfile, char *keyfile, in qtest_create_quic_objects() argument 315 keyfile))) in qtest_create_quic_objects()
|
/openssl/test/ocsp-tests/ |
H A D | mk-ocsp-cert-chain.sh | 92 -keyfile intermediate-key.pem \
|
/openssl/apps/lib/ |
H A D | s_cb.c | 946 const char *keyfile; member 1110 if (exc->keyfile != NULL) { in load_excert() 1111 exc->key = load_key(exc->keyfile, exc->keyform, in load_excert() 1158 if (exc->keyfile != NULL) { in args_excert() 1162 exc->keyfile = opt_arg(); in args_excert()
|
/openssl/doc/man1/ |
H A D | openssl-ca.pod.in | 39 [B<-keyfile> I<filename>|I<uri>] 162 The CA certificate, which must match with B<-keyfile>. 169 =item B<-keyfile> I<filename>|I<uri> 213 the certificate requests were signed with (given with B<-keyfile>). 506 Same as the B<-keyfile> option. The file containing the
|
H A D | openssl-s_time.pod.in | 67 =item B<-key> I<keyfile>
|
H A D | openssl-req.pod.in | 742 default_keyfile = keyfile.pem
|
/openssl/doc/designs/quic-design/ |
H A D | quic-fault-injector.md | 212 * keyfile, create a server and client instances as well as a fault injector 216 SSL_CTX *serverctx, char *certfile, char *keyfile,
|